All the vulnerabilites related to IBM - Sterling B2B Integrator
var-201307-0298
Vulnerability from variot

An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote attackers to hijack sessions, and consequently obtain sensitive information, via a brute-force attack. IBM Sterling B2B Integrator and IBM Sterling File Gateway is prone to a session-hijacking vulnerability. An attacker can exploit this issue to gain unauthorized access to the affected application. The following products are vulnerable: IBM Sterling B2B Integrator 5.2 and 5.1 IBM Sterling File Gateway 2.2 and 2.1. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0298",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60988",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60988",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0539",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2013-0539",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-60541",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0539",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0539",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-054",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60541",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An unspecified third-party component in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 uses short session ID values, which makes it easier for remote attackers to hijack sessions, and consequently obtain sensitive information, via a brute-force attack. IBM Sterling B2B Integrator and IBM Sterling File Gateway is prone to a session-hijacking vulnerability. \nAn attacker can exploit this issue to gain unauthorized access to the affected application. \nThe following products are vulnerable:\nIBM Sterling B2B Integrator 5.2 and 5.1\nIBM Sterling File Gateway 2.2 and 2.1. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "BID",
            id: "60988",
         },
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0539",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "82916",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC92007",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60988",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60541",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            db: "BID",
            id: "60988",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   id: "VAR-201307-0298",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:49:25.062000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC92007",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC92007",
         },
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-255",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic92007",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82916",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0539",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0539",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/82916",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            db: "BID",
            id: "60988",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            db: "BID",
            id: "60988",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            date: "2013-06-30T00:00:00",
            db: "BID",
            id: "60988",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            date: "2013-07-03T13:54:31.030000",
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60541",
         },
         {
            date: "2013-06-30T00:00:00",
            db: "BID",
            id: "60988",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
         {
            date: "2017-08-29T01:33:05.697000",
            db: "NVD",
            id: "CVE-2013-0539",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to session hijacking",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003200",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "trust management",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-054",
         },
      ],
      trust: 0.6,
   },
}

var-201501-0390
Vulnerability from variot

The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote attackers to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request. Multiple IBM products are prone to a remote denial-of-service vulnerability. Successful exploits may allow an attacker to cause an affected device to crash, resulting in a denial-of-service condition. IBM Sterling B2B Integrator is a set of software that integrates B2B processes, transactions and relationships of different partner communities. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0390",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2.5.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2.4.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "5.2.4.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "5.2.x",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.41",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "72022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "72022",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2014-6199",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2014-6199",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-74142",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-6199",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-6199",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201501-196",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-74142",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote attackers to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request. Multiple IBM products are prone to a remote denial-of-service vulnerability. \nSuccessful exploits may allow an attacker to cause an affected device to crash, resulting in a denial-of-service condition. IBM Sterling B2B Integrator is a set of software that integrates B2B processes, transactions and relationships of different partner communities. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "BID",
            id: "72022",
         },
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-6199",
            trust: 2.8,
         },
         {
            db: "SECUNIA",
            id: "62082",
            trust: 1.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "98650",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "72022",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-74142",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            db: "BID",
            id: "72022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   id: "VAR-201501-0390",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:45:59.369000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IT05121",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05121",
         },
         {
            title: "1693131",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21693131",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21693131",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1it05121",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/62082",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/98650",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6199",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6199",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/98650",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/en/b2b-integrator",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/en/file-gateway",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            db: "BID",
            id: "72022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            db: "BID",
            id: "72022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-01-10T00:00:00",
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            date: "2015-01-09T00:00:00",
            db: "BID",
            id: "72022",
         },
         {
            date: "2015-01-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            date: "2015-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            date: "2015-01-10T02:59:27.273000",
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-09-08T00:00:00",
            db: "VULHUB",
            id: "VHN-74142",
         },
         {
            date: "2015-01-09T00:00:00",
            db: "BID",
            id: "72022",
         },
         {
            date: "2015-01-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
         {
            date: "2015-01-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
         {
            date: "2024-11-21T02:13:57.747000",
            db: "NVD",
            id: "CVE-2014-6199",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway of  HTTP Server Adapter Service disruption in  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-007570",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201501-196",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0129
Vulnerability from variot

Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0129",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60983",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "60983",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0468",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2013-0468",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-60470",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0468",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0468",
                  trust: 0.8,
                  value: "Low",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-050",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60470",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "BID",
            id: "60983",
         },
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0468",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "81334",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60983",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60470",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            db: "BID",
            id: "60983",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   id: "VAR-201307-0129",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T13:16:22.575000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81334",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0468",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0468",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81334",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            db: "BID",
            id: "60983",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            db: "BID",
            id: "60983",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60983",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            date: "2013-07-03T13:54:30.967000",
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60470",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60983",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
         {
            date: "2017-08-29T01:33:02.557000",
            db: "NVD",
            id: "CVE-2013-0468",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003195",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-050",
         },
      ],
      trust: 0.6,
   },
}

var-201312-0174
Vulnerability from variot

Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker can exploit this vulnerability to execute arbitrary SQL commands

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0174",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64442",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5409",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-5409",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-65411",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5409",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5409",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-446",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65411",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors. \nA successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker can exploit this vulnerability to execute arbitrary SQL commands",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "BID",
            id: "64442",
         },
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5409",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "20135409",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "87358",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC96049",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "64442",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-65411",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            db: "BID",
            id: "64442",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   id: "VAR-201312-0174",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T23:05:48.774000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-89",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96049",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87358",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5409",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5409",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87358",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            db: "BID",
            id: "64442",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64442",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            date: "2013-12-21T14:22:56.957000",
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65411",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64442",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
         {
            date: "2024-11-21T01:57:25.900000",
            db: "NVD",
            id: "CVE-2013-5409",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway In  SQL Injection vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005675",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "SQL injection",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-446",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0294
Vulnerability from variot

Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0294",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60998",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0560",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0560",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-60562",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0560",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0560",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-056",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60562",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2012-5766. \nA successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "BID",
            id: "60998",
         },
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0560",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "83012",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60998",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60562",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            db: "BID",
            id: "60998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   id: "VAR-201307-0294",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:59:31.849000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-89",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/83012",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0560",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0560",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/83012",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            db: "BID",
            id: "60998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            db: "BID",
            id: "60998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60998",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            date: "2013-07-03T13:54:31.047000",
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60562",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60998",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
         {
            date: "2017-08-29T01:33:06.463000",
            db: "NVD",
            id: "CVE-2013-0560",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway In  SQL Injection vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003202",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "SQL injection",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-056",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0066
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0066",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60990",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60990",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-2987",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-2987",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-62989",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-2987",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-2987",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-062",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-62989",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2013-2987",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "BID",
            id: "60990",
         },
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-2987",
            trust: 2.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "84009",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60990",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-62989",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            db: "BID",
            id: "60990",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   id: "VAR-201307-0066",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T13:09:34.366000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.2,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/84009",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2987",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2987",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/84009",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            db: "BID",
            id: "60990",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            db: "BID",
            id: "60990",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60990",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            date: "2013-07-03T13:54:31.097000",
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-62989",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2013-2987",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60990",
         },
         {
            date: "2013-10-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
         {
            date: "2017-08-29T01:33:18.870000",
            db: "NVD",
            id: "CVE-2013-2987",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003208",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-062",
         },
      ],
      trust: 0.6,
   },
}

var-201708-0255
Vulnerability from variot

XML External Entity (XXE) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and IBM Sterling File Gateway 2.1 and 2.2 allows remote attackers to read arbitrary files via a crafted XML data. Multiple IBM Products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to gain access to sensitive information that may lead to further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0255",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.5",
         },
         {
            model: "sterling b2b integrator",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2015-0194",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2015-0194",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-78140",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.8,
                  id: "CVE-2015-0194",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-0194",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-0194",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201506-554",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-78140",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XML External Entity (XXE) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and IBM Sterling File Gateway 2.1 and 2.2 allows remote attackers to read arbitrary files via a crafted XML data. Multiple IBM Products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to gain access to sensitive information that may lead to further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-0194",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "73401",
            trust: 2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-78140",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   id: "VAR-201708-0255",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T23:12:24.597000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1699482",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699482",
         },
         {
            title: "IT06733",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IT06733",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-611",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1it06733",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699482",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/73401",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0194",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0194",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            db: "BID",
            id: "73401",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-02T00:00:00",
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            date: "2015-03-26T00:00:00",
            db: "BID",
            id: "73401",
         },
         {
            date: "2017-09-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            date: "2015-03-26T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            date: "2017-08-02T19:29:00.287000",
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-14T00:00:00",
            db: "VULHUB",
            id: "VHN-78140",
         },
         {
            date: "2015-03-26T00:00:00",
            db: "BID",
            id: "73401",
         },
         {
            date: "2017-09-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
         {
            date: "2017-08-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
         {
            date: "2024-11-21T02:22:30.800000",
            db: "NVD",
            id: "CVE-2015-0194",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  IBM Sterling File Gateway In  XML External entity vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-007691",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-554",
         },
      ],
      trust: 0.6,
   },
}

var-201506-0496
Vulnerability from variot

Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. OpenSSL is prone to a race-condition security vulnerability. The impact of this issue is currently unknown. We will update this BID when more information emerges. The following are vulnerable: OpenSSL 1.0.2 prior to 1.0.2b OpenSSL 1.0.1 prior to 1.0.1n OpenSSL 1.0.0 prior to 1.0.0s OpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015] =======================================

DHE man-in-the-middle protection (Logjam)

A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).

OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.

Malformed ECParameters causes infinite loop (CVE-2015-1788)

Severity: Moderate

When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field.

This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.

This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.

Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

Severity: Moderate

X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.

An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.

PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)

Severity: Moderate

The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.

Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.

This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The fix was developed by Matt Caswell of the OpenSSL development team. It existed in previous OpenSSL versions and was fixed in June 2014.

If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.

This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.

The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

.

Release Date: 2015-08-05 Last Updated: 2015-08-05

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled.

This is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as Logjam which could be exploited remotely resulting in disclosure of information.

References:

CVE-2015-4000: DHE man-in-the-middle protection (Logjam).

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided an updated version of OpenSSL to resolve this vulnerability.

A new B.11.31 depot for OpenSSL_A.01.00.01p is available here:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I

MANUAL ACTIONS: Yes - Update

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.01.00.01p or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 5 August 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-02


                                       https://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: June 22, 2015 Bugs: #551832 ID: 201506-02


Synopsis

Multiple vulnerabilities have been found in OpenSSL that can result in either Denial of Service or information disclosure.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o

Description

Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details.

Workaround

There is no known workaround at this time.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7"

References

[ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201506-02

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS) or unauthorized access.

References:

  • CVE-2014-8176 - Remote Denial of Service (DoS)
  • CVE-2015-1788 - Remote Denial of Service (DoS)
  • CVE-2015-1789 - Remote Denial of Service (DoS)
  • CVE-2015-1790 - Remote Denial of Service (DoS)
  • CVE-2015-1791 - Remote Denial of Service (DoS)
  • CVE-2015-1792 - Remote Denial of Service (DoS)
  • CVE-2015-1793 - Remote Unauthorized Access
  • PSRT110158, SSRT102264

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

Please refer to the RESOLUTION below for a list of impacted products.

COMWARE 5 Products

  • A6600 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JC165A HP 6600 RPE-X1 Router Module
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JC566A HP 6600 RSE-X1 Router Main Processing Unit
    • JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
    • JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  • HSR6602 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JC176A HP 6602 Router Chassis
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG355A HP 6600 MCP-X1 Router Main Processing Unit
    • JG356A HP 6600 MCP-X2 Router Main Processing Unit
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
    • JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  • HSR6800 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  • MSR20 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD432A HP A-MSR20-21 Router
    • JD662A HP MSR20-20 Router
    • JD663A HP A-MSR20-21 Router
    • JD663B HP MSR20-21 Router
    • JD664A HP MSR20-40 Router
    • JF228A HP MSR20-40 Router
    • JF283A HP MSR20-20 Router
  • MSR20-1X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD431A HP MSR20-10 Router
    • JD667A HP MSR20-15 IW Multi-Service Router
    • JD668A HP MSR20-13 Multi-Service Router
    • JD669A HP MSR20-13 W Multi-Service Router
    • JD670A HP MSR20-15 A Multi-Service Router
    • JD671A HP MSR20-15 AW Multi-Service Router
    • JD672A HP MSR20-15 I Multi-Service Router
    • JD673A HP MSR20-11 Multi-Service Router
    • JD674A HP MSR20-12 Multi-Service Router
    • JD675A HP MSR20-12 W Multi-Service Router
    • JD676A HP MSR20-12 T1 Multi-Service Router
    • JF236A HP MSR20-15-I Router
    • JF237A HP MSR20-15-A Router
    • JF238A HP MSR20-15-I-W Router
    • JF239A HP MSR20-11 Router
    • JF240A HP MSR20-13 Router
    • JF241A HP MSR20-12 Router
    • JF806A HP MSR20-12-T Router
    • JF807A HP MSR20-12-W Router
    • JF808A HP MSR20-13-W Router
    • JF809A HP MSR20-15-A-W Router
    • JF817A HP MSR20-15 Router
    • JG209A HP MSR20-12-T-W Router (NA)
    • JG210A HP MSR20-13-W Router (NA)
  • MSR 30 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD654A HP MSR30-60 POE Multi-Service Router
    • JD657A HP MSR30-40 Multi-Service Router
    • JD658A HP MSR30-60 Multi-Service Router
    • JD660A HP MSR30-20 POE Multi-Service Router
    • JD661A HP MSR30-40 POE Multi-Service Router
    • JD666A HP MSR30-20 Multi-Service Router
    • JF229A HP MSR30-40 Router
    • JF230A HP MSR30-60 Router
    • JF232A HP RTMSR3040-AC-OVSAS-H3
    • JF235A HP MSR30-20 DC Router
    • JF284A HP MSR30-20 Router
    • JF287A HP MSR30-40 DC Router
    • JF801A HP MSR30-60 DC Router
    • JF802A HP MSR30-20 PoE Router
    • JF803A HP MSR30-40 PoE Router
    • JF804A HP MSR30-60 PoE Router
    • JG728A HP MSR30-20 TAA-compliant DC Router
    • JG729A HP MSR30-20 TAA-compliant Router
  • MSR 30-16 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD659A HP MSR30-16 POE Multi-Service Router
    • JD665A HP MSR30-16 Multi-Service Router
    • JF233A HP MSR30-16 Router
    • JF234A HP MSR30-16 PoE Router
  • MSR 30-1X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JF800A HP MSR30-11 Router
    • JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
    • JG182A HP MSR30-11E Router
    • JG183A HP MSR30-11F Router
    • JG184A HP MSR30-10 DC Router
  • MSR 50 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD433A HP MSR50-40 Router
    • JD653A HP MSR50 Processor Module
    • JD655A HP MSR50-40 Multi-Service Router
    • JD656A HP MSR50-60 Multi-Service Router
    • JF231A HP MSR50-60 Router
    • JF285A HP MSR50-40 DC Router
    • JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
  • MSR 50-G2 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD429A HP MSR50 G2 Processor Module
    • JD429B HP MSR50 G2 Processor Module
  • MSR 9XX (Comware 5) - Version: R2514P10
    • HP Network Products
    • JF812A HP MSR900 Router
    • JF813A HP MSR920 Router
    • JF814A HP MSR900-W Router
    • JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr
    • JG207A HP MSR900-W Router (NA)
    • JG208A HP MSR920-W Router (NA)
  • MSR 93X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JG511A HP MSR930 Router
    • JG511B HP MSR930 Router
    • JG512A HP MSR930 Wireless Router
    • JG513A HP MSR930 3G Router
    • JG513B HP MSR930 3G Router
    • JG514A HP MSR931 Router
    • JG514B HP MSR931 Router
    • JG515A HP MSR931 3G Router
    • JG516A HP MSR933 Router
    • JG517A HP MSR933 3G Router
    • JG518A HP MSR935 Router
    • JG518B HP MSR935 Router
    • JG519A HP MSR935 Wireless Router
    • JG520A HP MSR935 3G Router
    • JG531A HP MSR931 Dual 3G Router
    • JG531B HP MSR931 Dual 3G Router
    • JG596A HP MSR930 4G LTE/3G CDMA Router
    • JG597A HP MSR936 Wireless Router
    • JG665A HP MSR930 4G LTE/3G WCDMA Global Router
    • JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
    • JH009A HP MSR931 Serial (TI) Router
    • JH010A HP MSR933 G.SHDSL (TI) Router
    • JH011A HP MSR935 ADSL2+ (TI) Router
    • JH012A HP MSR930 Wireless 802.11n (NA) Router
    • JH012B HP MSR930 Wireless 802.11n (NA) Router
    • JH013A HP MSR935 Wireless 802.11n (NA) Router
  • MSR1000 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JG732A HP MSR1003-8 AC Router
  • 12500 (Comware 5) - Version: R1829P01
    • HP Network Products
    • JC072B HP 12500 Main Processing Unit
    • JC085A HP A12518 Switch Chassis
    • JC086A HP A12508 Switch Chassis
    • JC652A HP 12508 DC Switch Chassis
    • JC653A HP 12518 DC Switch Chassis
    • JC654A HP 12504 AC Switch Chassis
    • JC655A HP 12504 DC Switch Chassis
    • JC808A HP 12500 TAA Main Processing Unit
    • JF430A HP A12518 Switch Chassis
    • JF430B HP 12518 Switch Chassis
    • JF430C HP 12518 AC Switch Chassis
    • JF431A HP A12508 Switch Chassis
    • JF431B HP 12508 Switch Chassis
    • JF431C HP 12508 AC Switch Chassis
  • 9500E (Comware 5) - Version: R1829P01
    • HP Network Products
    • JC124A HP A9508 Switch Chassis
    • JC124B HP 9505 Switch Chassis
    • JC125A HP A9512 Switch Chassis
    • JC125B HP 9512 Switch Chassis
    • JC474A HP A9508-V Switch Chassis
    • JC474B HP 9508-V Switch Chassis
  • 10500 (Comware 5) - Version: R1210P01
    • HP Network Products
    • JC611A HP 10508-V Switch Chassis
    • JC612A HP 10508 Switch Chassis
    • JC613A HP 10504 Switch Chassis
    • JC614A HP 10500 Main Processing Unit
    • JC748A HP 10512 Switch Chassis
    • JG375A HP 10500 TAA-compliant Main Processing Unit
    • JG820A HP 10504 TAA-compliant Switch Chassis
    • JG821A HP 10508 TAA-compliant Switch Chassis
    • JG822A HP 10508-V TAA-compliant Switch Chassis
    • JG823A HP 10512 TAA-compliant Switch Chassis
  • 7500 (Comware 5) - Version: R6710P01
    • HP Network Products
    • JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo
    • JC697A HP 7502 TAA-compliant Main Processing Unit
    • JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports
    • JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports
    • JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit
    • JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit
    • JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports
    • JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports
    • JD194A HP 7500 384Gbps Fabric Module
    • JD194B HP 7500 384Gbps Fabric Module
    • JD195A HP 7500 384Gbps Advanced Fabric Module
    • JD196A HP 7502 Fabric Module
    • JD220A HP 7500 768Gbps Fabric Module
    • JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports
    • JD238A HP 7510 Switch Chassis
    • JD238B HP 7510 Switch Chassis
    • JD239A HP 7506 Switch Chassis
    • JD239B HP 7506 Switch Chassis
    • JD240A HP 7503 Switch Chassis
    • JD240B HP 7503 Switch Chassis
    • JD241A HP 7506-V Switch Chassis
    • JD241B HP 7506-V Switch Chassis
    • JD242A HP 7502 Switch Chassis
    • JD242B HP 7502 Switch Chassis
    • JD243A HP 7503-S Switch Chassis with 1 Fabric Slot
    • JD243B HP 7503-S Switch Chassis with 1 Fabric Slot
    • JE164A HP E7902 Switch Chassis
    • JE165A HP E7903 Switch Chassis
    • JE166A HP E7903 1 Fabric Slot Switch Chassis
    • JE167A HP E7906 Switch Chassis
    • JE168A HP E7906 Vertical Switch Chassis
    • JE169A HP E7910 Switch Chassis
  • 5830 (Comware 5) - Version: R1118P13
    • HP Network Products
    • JC691A HP 5830AF-48G Switch with 1 Interface Slot
    • JC694A HP 5830AF-96G Switch
    • JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot
    • JG374A HP 5830AF-96G TAA-compliant Switch
  • 5800 (Comware 5) - Version: R1809P11
    • HP Network Products
    • JC099A HP 5800-24G-PoE Switch
    • JC099B HP 5800-24G-PoE+ Switch
    • JC100A HP 5800-24G Switch
    • JC100B HP 5800-24G Switch
    • JC101A HP 5800-48G Switch with 2 Slots
    • JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots
    • JC103A HP 5800-24G-SFP Switch
    • JC103B HP 5800-24G-SFP Switch with 1 Interface Slot
    • JC104A HP 5800-48G-PoE Switch
    • JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot
    • JC105A HP 5800-48G Switch
    • JC105B HP 5800-48G Switch with 1 Interface Slot
    • JG254A HP 5800-24G-PoE+ TAA-compliant Switch
    • JG254B HP 5800-24G-PoE+ TAA-compliant Switch
    • JG255A HP 5800-24G TAA-compliant Switch
    • JG255B HP 5800-24G TAA-compliant Switch
    • JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
    • JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
    • JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
    • JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
    • JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot
    • JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot
    • JG225A HP 5800AF-48G Switch
    • JG225B HP 5800AF-48G Switch
    • JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots
    • JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
    • JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
    • JG243B HP 5820-24XG-SFP+ TAA-compliant Switch
    • JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot
    • JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot
    • JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
    • JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot
    • JG219A HP 5820AF-24XG Switch
    • JG219B HP 5820AF-24XG Switch
    • JC102A HP 5820-24XG-SFP+ Switch
    • JC102B HP 5820-24XG-SFP+ Switch
  • 5500 HI (Comware 5) - Version: R5501P17
    • HP Network Products
    • JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots
    • JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots
    • JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots
    • JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots
    • JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots
    • JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
    • JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
    • JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots
  • 5500 EI (Comware 5) - Version: R2221P19
    • HP Network Products
    • JD373A HP 5500-24G DC EI Switch
    • JD374A HP 5500-24G-SFP EI Switch
    • JD375A HP 5500-48G EI Switch
    • JD376A HP 5500-48G-PoE EI Switch
    • JD377A HP 5500-24G EI Switch
    • JD378A HP 5500-24G-PoE EI Switch
    • JD379A HP 5500-24G-SFP DC EI Switch
    • JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots
    • JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots
    • JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface
    • JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots
    • JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots
    • JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
    • JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
  • 4800G (Comware 5) - Version: R2221P19
    • HP Network Products
    • JD007A HP 4800-24G Switch
    • JD008A HP 4800-24G-PoE Switch
    • JD009A HP 4800-24G-SFP Switch
    • JD010A HP 4800-48G Switch
    • JD011A HP 4800-48G-PoE Switch
  • 5500SI (Comware 5) - Version: R2221P20
    • HP Network Products
    • JD369A HP 5500-24G SI Switch
    • JD370A HP 5500-48G SI Switch
    • JD371A HP 5500-24G-PoE SI Switch
    • JD372A HP 5500-48G-PoE SI Switch
    • JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots
    • JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots
  • 4500G (Comware 5) - Version: R2221P20
    • HP Network Products
    • JF428A HP 4510-48G Switch
    • JF847A HP 4510-24G Switch
  • 5120 EI (Comware 5) - Version: R2221P20
    • HP Network Products
    • JE066A HP 5120-24G EI Switch
    • JE067A HP 5120-48G EI Switch
    • JE068A HP 5120-24G EI Switch with 2 Interface Slots
    • JE069A HP 5120-48G EI Switch with 2 Interface Slots
    • JE070A HP 5120-24G-PoE EI 2-slot Switch
    • JE071A HP 5120-48G-PoE EI 2-slot Switch
    • JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots
    • JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots
    • JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots
    • JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots
    • JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots
    • JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots
  • 4210G (Comware 5) - Version: R2221P20
    • HP Network Products
    • JF844A HP 4210-24G Switch
    • JF845A HP 4210-48G Switch
    • JF846A HP 4210-24G-PoE Switch
  • 5120 SI (Comware 5) - Version: R1516
    • HP Network Products
    • JE072A HP 5120-48G SI Switch
    • JE072B HPE 5120 48G SI Switch
    • JE073A HP 5120-16G SI Switch
    • JE073B HPE 5120 16G SI Switch
    • JE074A HP 5120-24G SI Switch
    • JE074B HPE 5120 24G SI Switch
    • JG091A HP 5120-24G-PoE+ (370W) SI Switch
    • JG091B HPE 5120 24G PoE+ (370W) SI Switch
    • JG092A HP 5120-24G-PoE+ (170W) SI Switch
    • JG309B HPE 5120 8G PoE+ (180W) SI Switch
    • JG310B HPE 5120 8G PoE+ (65W) SI Switch
  • 3610 (Comware 5) - Version: R5319P14
    • HP Network Products
    • JD335A HP 3610-48 Switch
    • JD336A HP 3610-24-4G-SFP Switch
    • JD337A HP 3610-24-2G-2G-SFP Switch
    • JD338A HP 3610-24-SFP Switch
  • 3600V2 (Comware 5) - Version: R2110P06
    • HP Network Products
    • JG299A HP 3600-24 v2 EI Switch
    • JG299B HP 3600-24 v2 EI Switch
    • JG300A HP 3600-48 v2 EI Switch
    • JG300B HP 3600-48 v2 EI Switch
    • JG301A HP 3600-24-PoE+ v2 EI Switch
    • JG301B HP 3600-24-PoE+ v2 EI Switch
    • JG301C HP 3600-24-PoE+ v2 EI Switch
    • JG302A HP 3600-48-PoE+ v2 EI Switch
    • JG302B HP 3600-48-PoE+ v2 EI Switch
    • JG302C HP 3600-48-PoE+ v2 EI Switch
    • JG303A HP 3600-24-SFP v2 EI Switch
    • JG303B HP 3600-24-SFP v2 EI Switch
    • JG304A HP 3600-24 v2 SI Switch
    • JG304B HP 3600-24 v2 SI Switch
    • JG305A HP 3600-48 v2 SI Switch
    • JG305B HP 3600-48 v2 SI Switch
    • JG306A HP 3600-24-PoE+ v2 SI Switch
    • JG306B HP 3600-24-PoE+ v2 SI Switch
    • JG306C HP 3600-24-PoE+ v2 SI Switch
    • JG307A HP 3600-48-PoE+ v2 SI Switch
    • JG307B HP 3600-48-PoE+ v2 SI Switch
    • JG307C HP 3600-48-PoE+ v2 SI Switch
  • 3100V2-48 (Comware 5) - Version: R2110P06
    • HP Network Products
    • JG315A HP 3100-48 v2 Switch
    • JG315B HP 3100-48 v2 Switch
  • HP870 (Comware 5) - Version: R2607P46
    • HP Network Products
    • JG723A HP 870 Unified Wired-WLAN Appliance
    • JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance
  • HP850 (Comware 5) - Version: R2607P46
    • HP Network Products
    • JG722A HP 850 Unified Wired-WLAN Appliance
    • JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance
  • HP830 (Comware 5) - Version: R3507P46
    • HP Network Products
    • JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch
    • JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch
    • JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch
    • JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant
  • HP6000 (Comware 5) - Version: R2507P46
    • HP Network Products
    • JG639A HP 10500/7500 20G Unified Wired-WLAN Module
    • JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module
  • WX5004-EI (Comware 5) - Version: R2507P46
    • HP Network Products
    • JD447B HP WX5002 Access Controller
    • JD448A HP WX5004 Access Controller
    • JD448B HP WX5004 Access Controller
    • JD469A HP WX5004 Access Controller
  • SecBlade FW (Comware 5) - Version: R3181P07
    • HP Network Products
    • JC635A HP 12500 VPN Firewall Module
    • JD245A HP 9500 VPN Firewall Module
    • JD249A HP 10500/7500 Advanced VPN Firewall Module
    • JD250A HP 6600 Firewall Processing Router Module
    • JD251A HP 8800 Firewall Processing Module
    • JD255A HP 5820 VPN Firewall Module
  • F1000-E (Comware 5) - Version: R3181P07
    • HP Network Products
    • JD272A HP F1000-E VPN Firewall Appliance
  • F1000-A-EI (Comware 5) - Version: R3734P08
    • HP Network Products
    • JG214A HP F1000-A-EI VPN Firewall Appliance
  • F1000-S-EI (Comware 5) - Version: R3734P08
    • HP Network Products
    • JG213A HP F1000-S-EI VPN Firewall Appliance
  • F5000-A (Comware 5) - Version: F3210P26
    • HP Network Products
    • JD259A HP A5000-A5 VPN Firewall Chassis
    • JG215A HP F5000 Firewall Main Processing Unit
    • JG216A HP F5000 Firewall Standalone Chassis
  • U200S and CS (Comware 5) - Version: F5123P33
    • HP Network Products
    • JD273A HP U200-S UTM Appliance
  • U200A and M (Comware 5) - Version: F5123P33
    • HP Network Products
    • JD275A HP U200-A UTM Appliance
  • F5000-C/S (Comware 5) - Version: R3811P05
    • HP Network Products
    • JG650A HP F5000-C VPN Firewall Appliance
    • JG370A HP F5000-S VPN Firewall Appliance
  • SecBlade III (Comware 5) - Version: R3820P06
    • HP Network Products
    • JG371A HP 12500 20Gbps VPN Firewall Module
    • JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module
  • 6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JC566A HP 6600 RSE-X1 Router Main Processing Unit
    • JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  • 6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC165A) HP 6600 RPE-X1 Router Module
    • JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  • 6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC176A) HP 6602 Router Chassis
  • HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG355A HP 6600 MCP-X1 Router Main Processing Unit
    • JG356A HP 6600 MCP-X2 Router Main Processing Unit
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
    • JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  • HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  • SMB1910 (Comware 5) - Version: R1111
    • HP Network Products
    • JG540A HP 1910-48 Switch
    • JG539A HP 1910-24-PoE+ Switch
    • JG538A HP 1910-24 Switch
    • JG537A HP 1910-8 -PoE+ Switch
    • JG536A HP 1910-8 Switch
  • SMB1920 (Comware 5) - Version: R1109
    • HP Network Products
    • JG928A HP 1920-48G-PoE+ (370W) Switch
    • JG927A HP 1920-48G Switch
    • JG926A HP 1920-24G-PoE+ (370W) Switch
    • JG925A HP 1920-24G-PoE+ (180W) Switch
    • JG924A HP 1920-24G Switch
    • JG923A HP 1920-16G Switch
    • JG922A HP 1920-8G-PoE+ (180W) Switch
    • JG921A HP 1920-8G-PoE+ (65W) Switch
    • JG920A HP 1920-8G Switch
  • V1910 (Comware 5) - Version: R1516
    • HP Network Products
    • JE005A HP 1910-16G Switch
    • JE006A HP 1910-24G Switch
    • JE007A HP 1910-24G-PoE (365W) Switch
    • JE008A HP 1910-24G-PoE(170W) Switch
    • JE009A HP 1910-48G Switch
    • JG348A HP 1910-8G Switch
    • JG349A HP 1910-8G-PoE+ (65W) Switch
    • JG350A HP 1910-8G-PoE+ (180W) Switch
  • SMB 1620 (Comware 5) - Version: R1108
    • HP Network Products
    • JG914A HP 1620-48G Switch
    • JG913A HP 1620-24G Switch
    • JG912A HP 1620-8G Switch

COMWARE 7 Products

  • 12500 (Comware 7) - Version: R7376
    • HP Network Products
    • JC072B HP 12500 Main Processing Unit
    • JC085A HP A12518 Switch Chassis
    • JC086A HP A12508 Switch Chassis
    • JC652A HP 12508 DC Switch Chassis
    • JC653A HP 12518 DC Switch Chassis
    • JC654A HP 12504 AC Switch Chassis
    • JC655A HP 12504 DC Switch Chassis
    • JF430A HP A12518 Switch Chassis
    • JF430B HP 12518 Switch Chassis
    • JF430C HP 12518 AC Switch Chassis
    • JF431A HP A12508 Switch Chassis
    • JF431B HP 12508 Switch Chassis
    • JF431C HP 12508 AC Switch Chassis
    • JG497A HP 12500 MPU w/Comware V7 OS
    • JG782A HP FF 12508E AC Switch Chassis
    • JG783A HP FF 12508E DC Switch Chassis
    • JG784A HP FF 12518E AC Switch Chassis
    • JG785A HP FF 12518E DC Switch Chassis
    • JG802A HP FF 12500E MPU
  • 10500 (Comware 7) - Version: R7170
    • HP Network Products
    • JC611A HP 10508-V Switch Chassis
    • JC612A HP 10508 Switch Chassis
    • JC613A HP 10504 Switch Chassis
    • JC748A HP 10512 Switch Chassis
    • JG608A HP FlexFabric 11908-V Switch Chassis
    • JG609A HP FlexFabric 11900 Main Processing Unit
    • JG820A HP 10504 TAA Switch Chassis
    • JG821A HP 10508 TAA Switch Chassis
    • JG822A HP 10508-V TAA Switch Chassis
    • JG823A HP 10512 TAA Switch Chassis
    • JG496A HP 10500 Type A MPU w/Comware v7 OS
    • JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
    • JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
  • 12900 (Comware 7) - Version: R1138P01
    • HP Network Products
    • JG619A HP FlexFabric 12910 Switch AC Chassis
    • JG621A HP FlexFabric 12910 Main Processing Unit
    • JG632A HP FlexFabric 12916 Switch AC Chassis
    • JG634A HP FlexFabric 12916 Main Processing Unit
    • JH104A HP FlexFabric 12900E Main Processing Unit
    • JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
    • JH263A HP FlexFabric 12904E Main Processing Unit
    • JH255A HP FlexFabric 12908E Switch Chassis
    • JH262A HP FlexFabric 12904E Switch Chassis
    • JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
    • JH103A HP FlexFabric 12916E Switch Chassis
  • 5900 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JC772A HP 5900AF-48XG-4QSFP+ Switch
    • JG296A HP 5920AF-24XG Switch
    • JG336A HP 5900AF-48XGT-4QSFP+ Switch
    • JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
    • JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
    • JG555A HP 5920AF-24XG TAA Switch
    • JG838A HP FF 5900CP-48XG-4QSFP+ Switch
    • JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
    • JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
    • JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
  • MSR1000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG875A HP MSR1002-4 AC Router
    • JH060A HP MSR1003-8S AC Router
  • MSR2000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG411A HP MSR2003 AC Router
    • JG734A HP MSR2004-24 AC Router
    • JG735A HP MSR2004-48 Router
    • JG866A HP MSR2003 TAA-compliant AC Router
  • MSR3000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG404A HP MSR3064 Router
    • JG405A HP MSR3044 Router
    • JG406A HP MSR3024 AC Router
    • JG407A HP MSR3024 DC Router
    • JG408A HP MSR3024 PoE Router
    • JG409A HP MSR3012 AC Router
    • JG410A HP MSR3012 DC Router
    • JG861A HP MSR3024 TAA-compliant AC Router
  • MSR4000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG402A HP MSR4080 Router Chassis
    • JG403A HP MSR4060 Router Chassis
    • JG412A HP MSR4000 MPU-100 Main Processing Unit
    • JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
  • VSR (Comware 7) - Version: E0321P01
    • HP Network Products
    • JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
    • JG811AAE HP VSR1001 Comware 7 Virtual Services Router
    • JG812AAE HP VSR1004 Comware 7 Virtual Services Router
    • JG813AAE HP VSR1008 Comware 7 Virtual Services Router
  • 7900 (Comware 7) - Version: R2138P01
    • HP Network Products
    • JG682A HP FlexFabric 7904 Switch Chassis
    • JG841A HP FlexFabric 7910 Switch Chassis
    • JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
    • JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
    • JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
    • JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
    • JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
    • JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
  • 5130 (Comware 7) - Version: R3109P16
    • HP Network Products
    • JG932A HP 5130-24G-4SFP+ EI Switch
    • JG933A HP 5130-24G-SFP-4SFP+ EI Switch
    • JG934A HP 5130-48G-4SFP+ EI Switch
    • JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
    • JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
    • JG938A HP 5130-24G-2SFP+-2XGT EI Switch
    • JG939A HP 5130-48G-2SFP+-2XGT EI Switch
    • JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG975A HP 5130-24G-4SFP+ EI Brazil Switch
    • JG976A HP 5130-48G-4SFP+ EI Brazil Switch
    • JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
    • JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
  • 5700 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
    • JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
    • JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
    • JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
    • JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
    • JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
  • 5930 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JG726A HP FlexFabric 5930 32QSFP+ Switch
    • JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
    • JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
    • JH179A HP FlexFabric 5930 4-slot Switch
    • JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
    • JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
  • HSR6600 (Comware 7) - Version: R7103P05
    • HP Network Products
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
  • HSR6800 (Comware 7) - Version: R7103P05
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
    • JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
  • 1950 (Comware 7) - Version: R3109P16
    • HP Network Products
    • JG960A HP 1950-24G-4XG Switch
    • JG961A HP 1950-48G-2SFP+-2XGT Switch
    • JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
    • JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
  • 7500 (Comware 7) - Version: R7170
    • HP Network Products
    • JD238C HP 7510 Switch Chassis
    • JD239C HP 7506 Switch Chassis
    • JD240C HP 7503 Switch Chassis
    • JD242C HP 7502 Switch Chassis
    • JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
    • JH208A HP 7502 Main Processing Unit
    • JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit

iMC Products

  • iMC Plat - Version: iMC Plat 7.1 E0303P16
    • HP Network Products
    • JD125A HP IMC Std S/W Platform w/100-node
    • JD126A HP IMC Ent S/W Platform w/100-node
    • JD808A HP IMC Ent Platform w/100-node License
    • JD814A HP A-IMC Enterprise Edition Software DVD Media
    • JD815A HP IMC Std Platform w/100-node License
    • JD816A HP A-IMC Standard Edition Software DVD Media
    • JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU
    • JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU
    • JF377A HP IMC Std S/W Platform w/100-node Lic
    • JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
    • JF378A HP IMC Ent S/W Platform w/200-node Lic
    • JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
    • JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
    • JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
    • JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
    • JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
    • JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
    • JG659AAE HP IMC Smart Connect VAE E-LTU
    • JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
    • JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
    • JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
    • JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
    • JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
    • JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  • iMC iNode - Version: iNode PC 7.1 E0313, or, iNode PC 7.2 (E0401)
    • HP Network Products
    • JD144A HP A-IMC User Access Management Software Module with 200-user License
    • JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License
    • JD435A HP A-IMC Endpoint Admission Defense Client Software
    • JF388A HP IMC User Authentication Management Software Module with 200-user License
    • JF388AAE HP IMC User Authentication Management Software Module with 200-user E-LTU
    • JF391A HP IMC Endpoint Admission Defense Software Module with 200-user License
    • JF391AAE HP IMC Endpoint Admission Defense Software Module with 200-user E-LTU
    • JG752AAE HP IMC User Access Manager Software Module with 50-user E-LTU
    • JG754AAE) HP IMC Endpoint Admission Defense Software Module with 50-user E-LTU
  • iMC TAM_UAM - Version: iMC UAM_TAM 7.1 (E0307)
    • HP Network Products
    • JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
    • JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
    • JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
    • JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
    • JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
    • JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU
  • iMC NSM - Version: iMC WSM 7.1 E0303P10
    • HP Network Products
    • JD456A HP IMC WSM Software Module with 50-Access Point License
    • JF414A HP IMC Wireless Service Manager Software Module with 50-Access Point License
    • JF414AAE HP IMC Wireless Service Manager Software Module with 50-Access Point E-LTU
    • JG551AAE HP PCM+ Mobility Manager to IMC Wireless Service Manager Module Upgrade with 250 Access Point E-LTU
    • JG758AAE HP IMC WSM/RTLS w/ 50-node E-LTU
    • JG769AAE HP PCM Mobility Manager to IMC Wireless Service Manager Upg with 250-node E-LTU

VCX Products

  • VCX - Version: 9.8.18
    • HP Network Products
    • J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
    • J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
    • JC517A HP VCX V7205 Platform w/DL 360 G6 Server
    • JE355A HP VCX V6000 Branch Platform 9.0
    • JC516A HP VCX V7005 Platform w/DL 120 G6 Server
    • JC518A HP VCX Connect 200 Primry 120 G6 Server
    • J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
    • JE341A HP VCX Connect 100 Secondary
    • JE252A HP VCX Connect Primary MIM Module
    • JE253A HP VCX Connect Secondary MIM Module
    • JE254A HP VCX Branch MIM Module
    • JE355A HP VCX V6000 Branch Platform 9.0
    • JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
    • JD023A HP MSR30-40 Router with VCX MIM Module
    • JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
    • JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
    • JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
    • JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
    • JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
    • JE340A HP VCX Connect 100 Pri Server 9.0
    • JE342A HP VCX Connect 100 Sec Server 9.0

HISTORY Version:1 (rev.1) - 5 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1115-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1115.html Issue date: 2015-06-15 CVE Names: CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176)

A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216)

An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789)

A race condition was found in the session handling code of OpenSSL. (CVE-2015-1791)

A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792)

A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790)

Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Käsper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792.

All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent 1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function 1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket 1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm

ppc64: openssl-1.0.1e-30.el6_6.11.ppc.rpm openssl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm

s390x: openssl-1.0.1e-30.el6_6.11.s390.rpm openssl-1.0.1e-30.el6_6.11.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-devel-1.0.1e-30.el6_6.11.s390.rpm openssl-devel-1.0.1e-30.el6_6.11.s390x.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-static-1.0.1e-30.el6_6.11.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-perl-1.0.1e-30.el6_6.11.s390x.rpm openssl-static-1.0.1e-30.el6_6.11.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

ppc64: openssl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm

s390x: openssl-1.0.1e-42.el7_1.8.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-devel-1.0.1e-42.el7_1.8.s390.rpm openssl-devel-1.0.1e-42.el7_1.8.s390x.rpm openssl-libs-1.0.1e-42.el7_1.8.s390.rpm openssl-libs-1.0.1e-42.el7_1.8.s390x.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.ael7b_1.8.src.rpm

ppc64le: openssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-static-1.0.1e-42.el7_1.8.ppc.rpm openssl-static-1.0.1e-42.el7_1.8.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-perl-1.0.1e-42.el7_1.8.s390x.rpm openssl-static-1.0.1e-42.el7_1.8.s390.rpm openssl-static-1.0.1e-42.el7_1.8.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2014-8176 https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-1791 https://access.redhat.com/security/cve/CVE-2015-1792 https://access.redhat.com/security/cve/CVE-2015-3216 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk ZyXizCcFL9oAQexObjxp/Mo= =PXiY -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce.

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz: Upgraded. +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 383ecfed6bfef1440a44d7082745848a openssl-0.9.8zg-i486-1_slack13.0.txz fb186187ffa200e22d9450a9d0e321f6 openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: eb52318ed52fef726402f0b2a74745c5 openssl-0.9.8zg-x86_64-1_slack13.0.txz 9447927b960a01b21149e28a9783021f openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 37f46f6b4fe2acbe217eaf7c0b33b704 openssl-0.9.8zg-i486-1_slack13.1.txz 986de2e71676f61d788a59a1e0c8de1f openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: 6b160ce817dcde3ae5b3a861b284387b openssl-0.9.8zg-x86_64-1_slack13.1.txz 503d891680c711162386ea7e3daadca8 openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 5e7501b1d73d01d3d87704c3cfd3a888 openssl-0.9.8zg-i486-1_slack13.37.txz 874f0b59870dd3f259640c9930a02f99 openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: b6d91614458040d461dff3c3eab45206 openssl-0.9.8zg-x86_64-1_slack13.37.txz be106df5e59c2be7fa442df8ba85ad0b openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Slackware 14.0 packages: ee7c3937e6a6d7ac7537f751af7da7b9 openssl-1.0.1n-i486-1_slack14.0.txz 758662437d33f99ec0a686cedeb1919e openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 2dfdc4729e93cf460018e9e30a6223dc openssl-1.0.1n-x86_64-1_slack14.0.txz 9cb4b34e97e60f6bfe4c843aabeae954 openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 5a9bf08d55615cfc097109c2e3786f7b openssl-1.0.1n-i486-1_slack14.1.txz fb1c05468e5c38d51a8ff6ac435e3a20 openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: 1ef5cede3f954c3e4741012ffa76b750 openssl-1.0.1n-x86_64-1_slack14.1.txz ea22c288c60ae1d7ea8c5b3a1608462b openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Slackware -current packages: 56db8712d653c060f910e8915a8f8656 a/openssl-solibs-1.0.1n-i586-1.txz 6d6264c9943e27240db5c8f5ec342e27 n/openssl-1.0.1n-i586-1.txz

Slackware x86_64 -current packages: e73f7aff5aa0ad14bc06428544f99ae2 a/openssl-solibs-1.0.1n-x86_64-1.txz 91b550b9eb0ac0c580e158375a93c0e4 n/openssl-1.0.1n-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0496",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "15.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.3",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0r",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zf",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "hs series all versions",
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.2",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.9.5",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.01",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator probe option ver3.1.0.x to  ver4.1.0.x",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.0",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.02",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "webotx sip application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1 to  v8.1",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c cmm",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.8.5",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.63",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "6.1",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v4.2 to  v6.5",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator agent ver3.3 to  ver4.1",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.71",
         },
         {
            model: "communications applications",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle enterprise session border controller ecz7.3m1p4 and earlier",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.2",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.54",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver6.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.10 to  10.10.4",
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.2",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c ucm",
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v7.1",
         },
         {
            model: "e-business suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v7.1 to  v8.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  sg3600lm/lg/lj v6.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "systemmanager ver5.5.2 to  ver6.2.1",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.53",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  intersecvm/sg v1.2",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v4.1 to  v6.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard v8.2 to  v9.2",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "jobcenter r14.1",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7500/nv5500/nv3500 series",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.1",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.4 to  v9.2",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v4.1 to  v6.5",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0s",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "7.0",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7400/nv5400/nv3400 series",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator manager ver3.2.2 to  ver4.1",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v4.2 to  v6.5",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v4.0",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "mcoperations ver3.6.2 to  ver4.2",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "8.0",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "7.1",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "system management homepage",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v7.1 to  v8.1",
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.1",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle exalogic infrastructure eecs 2.0.6.2.3",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "uddi registry v1.1 to  v7.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  univerge sg3000lg/lj",
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0 manager component",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.14",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3.0.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.2",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0.0",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "hp-ux b.11.22",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "junos 12.1x47-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 14.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.13",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.6",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.12",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "open source siem",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "junos 13.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "communications session border controller scz7.4.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.2",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.2",
         },
         {
            model: "ascenlink",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "7.2.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.19",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "hp-ux b.11.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "workflow for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "imc products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37001.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "enterprise linux server eus 6.6.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos 14.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.8",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.15",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "qradar incident forensics mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "flashsystem 9848-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50001.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "qradar siem patch ifix01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.44",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.10.38",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.00",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.8",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 12.3x48-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.33",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "screenos 6.3.0r21",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.19",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "communications session border controller scz7.3.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 15.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2",
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.3",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.03",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "junos 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.1.8",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.1",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.1.8",
         },
         {
            model: "rational policy tester",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "junos 14.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.12",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "project openssl 1.0.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.9",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.30",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4.2",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.0",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aura conferencing sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.7",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "security network controller 1.0.3387m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "junos 12.1x44-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 15.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "50",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "exalogic infrastructure eecs",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.213",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.14",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.50",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.6",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "hp-ux b.11.11.16.09",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.5",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "screenos 6.3.0r22",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.4",
         },
         {
            model: "qradar siem mr2 patch ifi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.110",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry fixpack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.413",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.34",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.38",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "hp-ux b.11.11.13.14",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "junos 14.1r6",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.16",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.10",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "70",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.12",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.1.7",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0.1",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.3",
         },
         {
            model: "hp-ux b.11.23.1.007",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational developer for aix and linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "forticlient windows/mac",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.31",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "flashsystem 9848-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "flashsystem 9840-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.34",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "screenos 6.3.0r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.6",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security identity governance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.2.0",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.12.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.5",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.18",
         },
         {
            model: "flashsystem 9846-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.12",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.6",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "linux x86 64 -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.45",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.3",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.0.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "fortivoice enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.6",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "flashsystem 9846-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.7",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.19",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.1",
         },
         {
            model: "hp-ux b.11.11.02.008",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.16",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.0",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.1",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 12.1x46-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "netinsight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0.14",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.35",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.19",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "junos 14.2r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8zg",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4.0.6",
         },
         {
            model: "junos 13.2x51-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "powerkvm build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.157",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "qradar siem mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.12",
         },
         {
            model: "project openssl 1.0.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "vcx products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3",
         },
         {
            model: "qradar incident forensics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "junos 12.1x47-d45",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.10",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "qradar siem mr1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.37",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "flashsystem 9843-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "junos 12.1x44-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "hp-ux b.11.11.17.02",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.2",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "screenos 6.3.0r13",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.01",
         },
         {
            model: "fortiddos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "hp-ux b.11.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "secure backup",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.3",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.13",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "forticlient ios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.41",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "forticlient android",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.19",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "sonas",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.1.8",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.41",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "hp-ux b.11.23.07.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.7",
         },
         {
            model: "qradar incident forensics mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "aura conferencing sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.5",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.6",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.7",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11.15",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.6",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.02",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.2",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 12.1x46-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "junos 12.3r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.13",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "rational developer for aix and linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "linux enterprise server sp1 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.18",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "screenos 6.3.0r20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.5",
         },
         {
            model: "junos 13.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "project openssl 1.0.0r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1",
         },
         {
            model: "junos 15.1x49-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "forticache",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "junos 14.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.3",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "workload deployer if9",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.7",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.12",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.10",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "flashsystem 9848-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.13",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.2",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.62",
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.33",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.12",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35001.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.43",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.0",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "flashsystem 9846-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.2",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "fsso build",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "235",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "hp-ux b.11.11.14.15",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "fortiadc",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.2",
         },
         {
            model: "junos 12.3x48-d30",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.3",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.21",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3.1",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12.01",
         },
         {
            model: "unified security management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "hp-ux b.11.11.15.13",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.05",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "qradar incident forensics patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.2",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.12",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "junos 15.1x49-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 14.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.6",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.6",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.32",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.8",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security identity manager virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.8",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.214",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "15.04",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.19",
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "75161",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:communications_applications",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:e-business_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:fusion_middleware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:peoplesoft_products",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:supply_chain_products_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:virtualization_secure_global_desktop",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:system_management_homepage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterprise_directoryserver",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:istorage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:univerge",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_sip_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:websam",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
      ],
      trust: 0.4,
   },
   cve: "CVE-2015-1791",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2015-1791",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-1791",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-1791",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201506-247",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-1791",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. OpenSSL is prone to a race-condition security vulnerability. \nThe impact of this issue is currently unknown. We will update this BID when more information emerges. \nThe following are vulnerable:\nOpenSSL 1.0.2 prior to 1.0.2b\nOpenSSL 1.0.1 prior to 1.0.1n\nOpenSSL 1.0.0 prior to 1.0.0s\nOpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nMalformed ECParameters causes infinite loop (CVE-2015-1788)\n===========================================================\n\nSeverity: Moderate\n\nWhen processing an ECParameters structure OpenSSL enters an infinite loop if\nthe curve specified is over a specially malformed binary polynomial field. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates.  This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno Böck. The fix\nwas developed by Emilia Käsper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by  Michal\nZalewski (Google). The fix was developed by Emilia Käsper of the\nOpenSSL development team. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The\nfix was developed by Matt Caswell of the OpenSSL development team. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. \n\nRelease Date: 2015-08-05\nLast Updated: 2015-08-05\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running\nOpenSSL with SSL/TLS enabled. \n\nThis is the TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as Logjam which could be exploited remotely\nresulting in disclosure of information. \n\nReferences:\n\nCVE-2015-4000: DHE man-in-the-middle protection (Logjam). \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-4000    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2015-1788    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1789    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1790    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1791    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2015-1792    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1793    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided an updated version of OpenSSL to resolve this vulnerability. \n\nA new B.11.31 depot for OpenSSL_A.01.00.01p is available here:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.01.00.01p or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 5 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201506-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: June 22, 2015\n     Bugs: #551832\n       ID: 201506-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL that can result in\neither Denial of Service or information disclosure. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1o               >= 0.9.8z_p7\n                                                            >= 1.0.1o\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1o\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-8176\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176\n[ 2 ] CVE-2015-1788\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788\n[ 3 ] CVE-2015-1789\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789\n[ 4 ] CVE-2015-1790\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790\n[ 5 ] CVE-2015-1791\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791\n[ 6 ] CVE-2015-1792\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792\n[ 7 ] CVE-2015-4000\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201506-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. The\nvulnerabilities could be exploited remotely resulting in Denial of Service\n(DoS) or unauthorized access. \n\nReferences:\n\n  - CVE-2014-8176 - Remote Denial of Service (DoS)\n  - CVE-2015-1788 - Remote Denial of Service (DoS)\n  - CVE-2015-1789 - Remote Denial of Service (DoS)\n  - CVE-2015-1790 - Remote Denial of Service (DoS)\n  - CVE-2015-1791 - Remote Denial of Service (DoS)\n  - CVE-2015-1792 - Remote Denial of Service (DoS)\n  - CVE-2015-1793 - Remote Unauthorized Access\n  - PSRT110158, SSRT102264\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nPlease refer to the RESOLUTION\n below for a list of impacted products. \n\n**COMWARE 5 Products**\n\n  + **A6600 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JC165A HP 6600 RPE-X1 Router Module\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n      - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n      - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n  + **HSR6602 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JC176A HP 6602 Router Chassis\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n      - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n      - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n  + **HSR6800 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n  + **MSR20 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD432A HP A-MSR20-21 Router\n      - JD662A HP MSR20-20 Router\n      - JD663A HP A-MSR20-21 Router\n      - JD663B HP MSR20-21 Router\n      - JD664A HP MSR20-40 Router\n      - JF228A HP MSR20-40 Router\n      - JF283A HP MSR20-20 Router\n  + **MSR20-1X  (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD431A HP MSR20-10 Router\n      - JD667A HP MSR20-15 IW Multi-Service Router\n      - JD668A HP MSR20-13 Multi-Service Router\n      - JD669A HP MSR20-13 W Multi-Service Router\n      - JD670A HP MSR20-15 A Multi-Service Router\n      - JD671A HP MSR20-15 AW Multi-Service Router\n      - JD672A HP MSR20-15 I Multi-Service Router\n      - JD673A HP MSR20-11 Multi-Service Router\n      - JD674A HP MSR20-12 Multi-Service Router\n      - JD675A HP MSR20-12 W Multi-Service Router\n      - JD676A HP MSR20-12 T1 Multi-Service Router\n      - JF236A HP MSR20-15-I Router\n      - JF237A HP MSR20-15-A Router\n      - JF238A HP MSR20-15-I-W Router\n      - JF239A HP MSR20-11 Router\n      - JF240A HP MSR20-13 Router\n      - JF241A HP MSR20-12 Router\n      - JF806A HP MSR20-12-T Router\n      - JF807A HP MSR20-12-W Router\n      - JF808A HP MSR20-13-W Router\n      - JF809A HP MSR20-15-A-W Router\n      - JF817A HP MSR20-15 Router\n      - JG209A HP MSR20-12-T-W Router (NA)\n      - JG210A HP MSR20-13-W Router (NA)\n  + **MSR 30 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD654A HP MSR30-60 POE Multi-Service Router\n      - JD657A HP MSR30-40 Multi-Service Router\n      - JD658A HP MSR30-60 Multi-Service Router\n      - JD660A HP MSR30-20 POE Multi-Service Router\n      - JD661A HP MSR30-40 POE Multi-Service Router\n      - JD666A HP MSR30-20 Multi-Service Router\n      - JF229A HP MSR30-40 Router\n      - JF230A HP MSR30-60 Router\n      - JF232A HP RTMSR3040-AC-OVSAS-H3\n      - JF235A HP MSR30-20 DC Router\n      - JF284A HP MSR30-20 Router\n      - JF287A HP MSR30-40 DC Router\n      - JF801A HP MSR30-60 DC Router\n      - JF802A HP MSR30-20 PoE Router\n      - JF803A HP MSR30-40 PoE Router\n      - JF804A HP MSR30-60 PoE Router\n      - JG728A HP MSR30-20 TAA-compliant DC Router\n      - JG729A HP MSR30-20 TAA-compliant Router\n  + **MSR 30-16 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD659A HP MSR30-16 POE Multi-Service Router\n      - JD665A HP MSR30-16 Multi-Service Router\n      - JF233A HP MSR30-16 Router\n      - JF234A HP MSR30-16 PoE Router\n  + **MSR 30-1X (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JF800A HP MSR30-11 Router\n      - JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\n      - JG182A HP MSR30-11E Router\n      - JG183A HP MSR30-11F Router\n      - JG184A HP MSR30-10 DC Router\n  + **MSR 50 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD433A HP MSR50-40 Router\n      - JD653A HP MSR50 Processor Module\n      - JD655A HP MSR50-40 Multi-Service Router\n      - JD656A HP MSR50-60 Multi-Service Router\n      - JF231A HP MSR50-60 Router\n      - JF285A HP MSR50-40 DC Router\n      - JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n  + **MSR 50-G2 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD429A HP MSR50 G2 Processor Module\n      - JD429B HP MSR50 G2 Processor Module\n  + **MSR 9XX (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JF812A HP MSR900 Router\n      - JF813A HP MSR920 Router\n      - JF814A HP MSR900-W Router\n      - JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr\n      - JG207A HP MSR900-W Router (NA)\n      - JG208A HP MSR920-W Router (NA)\n  + **MSR 93X (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JG511A HP MSR930 Router\n      - JG511B HP MSR930 Router\n      - JG512A HP MSR930 Wireless Router\n      - JG513A HP MSR930 3G Router\n      - JG513B HP MSR930 3G Router\n      - JG514A HP MSR931 Router\n      - JG514B HP MSR931 Router\n      - JG515A HP MSR931 3G Router\n      - JG516A HP MSR933 Router\n      - JG517A HP MSR933 3G Router\n      - JG518A HP MSR935 Router\n      - JG518B HP MSR935 Router\n      - JG519A HP MSR935 Wireless Router\n      - JG520A HP MSR935 3G Router\n      - JG531A HP MSR931 Dual 3G Router\n      - JG531B HP MSR931 Dual 3G Router\n      - JG596A HP MSR930 4G LTE/3G CDMA Router\n      - JG597A HP MSR936 Wireless Router\n      - JG665A HP MSR930 4G LTE/3G WCDMA Global Router\n      - JG704A HP MSR930 4G LTE/3G WCDMA  ATT Router\n      - JH009A HP MSR931 Serial (TI) Router\n      - JH010A HP MSR933 G.SHDSL (TI) Router\n      - JH011A HP MSR935 ADSL2+ (TI) Router\n      - JH012A HP MSR930 Wireless 802.11n (NA) Router\n      - JH012B HP MSR930 Wireless 802.11n (NA) Router\n      - JH013A HP MSR935 Wireless 802.11n (NA) Router\n  + **MSR1000 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JG732A HP MSR1003-8 AC Router\n  + **12500 (Comware 5) - Version: R1829P01**\n    * HP Network Products\n      - JC072B HP 12500 Main Processing Unit\n      - JC085A HP A12518 Switch Chassis\n      - JC086A HP A12508 Switch Chassis\n      - JC652A HP 12508 DC Switch Chassis\n      - JC653A HP 12518 DC Switch Chassis\n      - JC654A HP 12504 AC Switch Chassis\n      - JC655A HP 12504 DC Switch Chassis\n      - JC808A HP 12500 TAA Main Processing Unit\n      - JF430A HP A12518 Switch Chassis\n      - JF430B HP 12518 Switch Chassis\n      - JF430C HP 12518 AC Switch Chassis\n      - JF431A HP A12508 Switch Chassis\n      - JF431B HP 12508 Switch Chassis\n      - JF431C HP 12508 AC Switch Chassis\n  + **9500E (Comware 5) - Version: R1829P01**\n    * HP Network Products\n      - JC124A HP A9508 Switch Chassis\n      - JC124B HP 9505 Switch Chassis\n      - JC125A HP A9512 Switch Chassis\n      - JC125B HP 9512 Switch Chassis\n      - JC474A HP A9508-V Switch Chassis\n      - JC474B HP 9508-V Switch Chassis\n  + **10500 (Comware 5) - Version: R1210P01**\n    * HP Network Products\n      - JC611A HP 10508-V Switch Chassis\n      - JC612A HP 10508 Switch Chassis\n      - JC613A HP 10504 Switch Chassis\n      - JC614A HP 10500 Main Processing Unit\n      - JC748A HP 10512 Switch Chassis\n      - JG375A HP 10500 TAA-compliant Main Processing Unit\n      - JG820A HP 10504 TAA-compliant Switch Chassis\n      - JG821A HP 10508 TAA-compliant Switch Chassis\n      - JG822A HP 10508-V TAA-compliant Switch Chassis\n      - JG823A HP 10512 TAA-compliant Switch Chassis\n  + **7500 (Comware 5) - Version: R6710P01**\n    * HP Network Products\n      - JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port\nGig-T/4-port GbE Combo\n      - JC697A HP 7502 TAA-compliant Main Processing Unit\n      - JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8\nGbE Combo Ports\n      - JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP\nPorts\n      - JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit\n      - JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit\n      - JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports\n      - JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports\n      - JD194A HP 7500 384Gbps Fabric Module\n      - JD194B HP 7500 384Gbps Fabric Module\n      - JD195A HP 7500 384Gbps Advanced Fabric Module\n      - JD196A HP 7502 Fabric Module\n      - JD220A HP 7500 768Gbps Fabric Module\n      - JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports\n      - JD238A HP 7510 Switch Chassis\n      - JD238B HP 7510 Switch Chassis\n      - JD239A HP 7506 Switch Chassis\n      - JD239B HP 7506 Switch Chassis\n      - JD240A HP 7503 Switch Chassis\n      - JD240B HP 7503 Switch Chassis\n      - JD241A HP 7506-V Switch Chassis\n      - JD241B HP 7506-V Switch Chassis\n      - JD242A HP 7502 Switch Chassis\n      - JD242B HP 7502 Switch Chassis\n      - JD243A HP 7503-S Switch Chassis with 1 Fabric Slot\n      - JD243B HP 7503-S Switch Chassis with 1 Fabric Slot\n      - JE164A HP E7902 Switch Chassis\n      - JE165A HP E7903 Switch Chassis\n      - JE166A HP E7903 1 Fabric Slot Switch Chassis\n      - JE167A HP E7906 Switch Chassis\n      - JE168A HP E7906 Vertical Switch Chassis\n      - JE169A HP E7910 Switch Chassis\n  + **5830 (Comware 5) - Version: R1118P13**\n    * HP Network Products\n      - JC691A HP 5830AF-48G Switch with 1 Interface Slot\n      - JC694A HP 5830AF-96G Switch\n      - JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot\n      - JG374A HP 5830AF-96G TAA-compliant Switch\n  + **5800 (Comware 5) - Version: R1809P11**\n    * HP Network Products\n      - JC099A HP 5800-24G-PoE Switch\n      - JC099B HP 5800-24G-PoE+ Switch\n      - JC100A HP 5800-24G Switch\n      - JC100B HP 5800-24G Switch\n      - JC101A HP 5800-48G Switch with 2 Slots\n      - JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots\n      - JC103A HP 5800-24G-SFP Switch\n      - JC103B HP 5800-24G-SFP Switch with 1 Interface Slot\n      - JC104A HP 5800-48G-PoE Switch\n      - JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot\n      - JC105A HP 5800-48G Switch\n      - JC105B HP 5800-48G Switch with 1 Interface Slot\n      - JG254A HP 5800-24G-PoE+ TAA-compliant Switch\n      - JG254B HP 5800-24G-PoE+ TAA-compliant Switch\n      - JG255A HP 5800-24G TAA-compliant Switch\n      - JG255B HP 5800-24G TAA-compliant Switch\n      - JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n      - JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n      - JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n      - JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n      - JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n      - JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n      - JG225A HP 5800AF-48G Switch\n      - JG225B HP 5800AF-48G Switch\n      - JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots\n      - JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface\n      - JG243A HP 5820-24XG-SFP+ TAA-compliant Switch\n      - JG243B HP 5820-24XG-SFP+ TAA-compliant Switch\n      - JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\n& 1 OAA Slot\n      - JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\nand 1 OAA Slot\n      - JC106A HP 5820-14XG-SFP+ Switch with 2 Slots\n      - JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot\n      - JG219A HP 5820AF-24XG Switch\n      - JG219B HP 5820AF-24XG Switch\n      - JC102A HP 5820-24XG-SFP+ Switch\n      - JC102B HP 5820-24XG-SFP+ Switch\n  + **5500 HI (Comware 5) - Version: R5501P17**\n    * HP Network Products\n      - JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots\n      - JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots\n      - JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots\n      - JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots\n      - JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots\n      - JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n      - JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n      - JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots\n  + **5500 EI (Comware 5) - Version: R2221P19**\n    * HP Network Products\n      - JD373A HP 5500-24G DC EI Switch\n      - JD374A HP 5500-24G-SFP EI Switch\n      - JD375A HP 5500-48G EI Switch\n      - JD376A HP 5500-48G-PoE EI Switch\n      - JD377A HP 5500-24G EI Switch\n      - JD378A HP 5500-24G-PoE EI Switch\n      - JD379A HP 5500-24G-SFP DC EI Switch\n      - JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots\n      - JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots\n      - JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface\n      - JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots\n      - JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots\n      - JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n      - JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n  + **4800G (Comware 5) - Version: R2221P19**\n    * HP Network Products\n      - JD007A HP 4800-24G Switch\n      - JD008A HP 4800-24G-PoE Switch\n      - JD009A HP 4800-24G-SFP Switch\n      - JD010A HP 4800-48G Switch\n      - JD011A HP 4800-48G-PoE Switch\n  + **5500SI (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JD369A HP 5500-24G SI Switch\n      - JD370A HP 5500-48G SI Switch\n      - JD371A HP 5500-24G-PoE SI Switch\n      - JD372A HP 5500-48G-PoE SI Switch\n      - JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots\n      - JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots\n  + **4500G (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JF428A HP 4510-48G Switch\n      - JF847A HP 4510-24G Switch\n  + **5120 EI (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JE066A HP 5120-24G EI Switch\n      - JE067A HP 5120-48G EI Switch\n      - JE068A HP 5120-24G EI Switch with 2 Interface Slots\n      - JE069A HP 5120-48G EI Switch with 2 Interface Slots\n      - JE070A HP 5120-24G-PoE EI 2-slot Switch\n      - JE071A HP 5120-48G-PoE EI 2-slot Switch\n      - JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots\n      - JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots\n      - JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots\n      - JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots\n      - JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots\n      - JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots\n  + **4210G (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JF844A HP 4210-24G Switch\n      - JF845A HP 4210-48G Switch\n      - JF846A HP 4210-24G-PoE Switch\n  + **5120 SI (Comware 5) - Version: R1516**\n    * HP Network Products\n      - JE072A HP 5120-48G SI Switch\n      - JE072B HPE 5120 48G SI Switch\n      - JE073A HP 5120-16G SI Switch\n      - JE073B HPE 5120 16G SI Switch\n      - JE074A HP 5120-24G SI Switch\n      - JE074B HPE 5120 24G SI Switch\n      - JG091A HP 5120-24G-PoE+ (370W) SI Switch\n      - JG091B HPE 5120 24G PoE+ (370W) SI Switch\n      - JG092A HP 5120-24G-PoE+ (170W) SI Switch\n      - JG309B HPE 5120 8G PoE+ (180W) SI Switch\n      - JG310B HPE 5120 8G PoE+ (65W) SI Switch\n  + **3610 (Comware 5) - Version: R5319P14**\n    * HP Network Products\n      - JD335A HP 3610-48 Switch\n      - JD336A HP 3610-24-4G-SFP Switch\n      - JD337A HP 3610-24-2G-2G-SFP Switch\n      - JD338A HP 3610-24-SFP Switch\n  + **3600V2 (Comware 5) - Version: R2110P06**\n    * HP Network Products\n      - JG299A HP 3600-24 v2 EI Switch\n      - JG299B HP 3600-24 v2 EI Switch\n      - JG300A HP 3600-48 v2 EI Switch\n      - JG300B HP 3600-48 v2 EI Switch\n      - JG301A HP 3600-24-PoE+ v2 EI Switch\n      - JG301B HP 3600-24-PoE+ v2 EI Switch\n      - JG301C HP 3600-24-PoE+ v2 EI Switch\n      - JG302A HP 3600-48-PoE+ v2 EI Switch\n      - JG302B HP 3600-48-PoE+ v2 EI Switch\n      - JG302C HP 3600-48-PoE+ v2 EI Switch\n      - JG303A HP 3600-24-SFP v2 EI Switch\n      - JG303B HP 3600-24-SFP v2 EI Switch\n      - JG304A HP 3600-24 v2 SI Switch\n      - JG304B HP 3600-24 v2 SI Switch\n      - JG305A HP 3600-48 v2 SI Switch\n      - JG305B HP 3600-48 v2 SI Switch\n      - JG306A HP 3600-24-PoE+ v2 SI Switch\n      - JG306B HP 3600-24-PoE+ v2 SI Switch\n      - JG306C HP 3600-24-PoE+ v2 SI Switch\n      - JG307A HP 3600-48-PoE+ v2 SI Switch\n      - JG307B HP 3600-48-PoE+ v2 SI Switch\n      - JG307C HP 3600-48-PoE+ v2 SI Switch\n  + **3100V2-48 (Comware 5) - Version: R2110P06**\n    * HP Network Products\n      - JG315A HP 3100-48 v2 Switch\n      - JG315B HP 3100-48 v2 Switch\n  + **HP870 (Comware 5) - Version: R2607P46**\n    * HP Network Products\n      - JG723A HP 870 Unified Wired-WLAN Appliance\n      - JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance\n  + **HP850 (Comware 5) - Version: R2607P46**\n    * HP Network Products\n      - JG722A HP 850 Unified Wired-WLAN Appliance\n      - JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance\n  + **HP830 (Comware 5) - Version: R3507P46**\n    * HP Network Products\n      - JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch\n      - JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch\n      - JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch\n      - JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant\n  + **HP6000 (Comware 5) - Version: R2507P46**\n    * HP Network Products\n      - JG639A HP 10500/7500 20G Unified Wired-WLAN Module\n      - JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module\n  + **WX5004-EI (Comware 5) - Version: R2507P46**\n    * HP Network Products\n      - JD447B HP WX5002 Access Controller\n      - JD448A HP WX5004 Access Controller\n      - JD448B HP WX5004 Access Controller\n      - JD469A HP WX5004 Access Controller\n  + **SecBlade FW (Comware 5) - Version: R3181P07**\n    * HP Network Products\n      - JC635A HP 12500 VPN Firewall Module\n      - JD245A HP 9500 VPN Firewall Module\n      - JD249A HP 10500/7500 Advanced VPN Firewall Module\n      - JD250A HP 6600 Firewall Processing Router Module\n      - JD251A HP 8800 Firewall Processing Module\n      - JD255A HP 5820 VPN Firewall Module\n  + **F1000-E (Comware 5) - Version: R3181P07**\n    * HP Network Products\n      - JD272A HP F1000-E VPN Firewall Appliance\n  + **F1000-A-EI (Comware 5) - Version: R3734P08**\n    * HP Network Products\n      - JG214A HP F1000-A-EI VPN Firewall Appliance\n  + **F1000-S-EI (Comware 5) - Version: R3734P08**\n    * HP Network Products\n      - JG213A HP F1000-S-EI VPN Firewall Appliance\n  + **F5000-A (Comware 5) - Version: F3210P26**\n    * HP Network Products\n      - JD259A HP A5000-A5 VPN Firewall Chassis\n      - JG215A HP F5000 Firewall Main Processing Unit\n      - JG216A HP F5000 Firewall Standalone Chassis\n  + **U200S and CS (Comware 5) - Version: F5123P33**\n    * HP Network Products\n      - JD273A HP U200-S UTM Appliance\n  + **U200A and M (Comware 5) - Version: F5123P33**\n    * HP Network Products\n      - JD275A HP U200-A UTM Appliance\n  + **F5000-C/S (Comware 5) - Version: R3811P05**\n    * HP Network Products\n      - JG650A HP F5000-C VPN Firewall Appliance\n      - JG370A HP F5000-S VPN Firewall Appliance\n  + **SecBlade III (Comware 5) - Version: R3820P06**\n    * HP Network Products\n      - JG371A HP 12500 20Gbps VPN Firewall Module\n      - JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module\n  + **6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n      - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n  + **6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC165A) HP 6600 RPE-X1 Router Module\n      - JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n  + **6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC176A) HP 6602 Router Chassis\n  + **HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n      - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n      - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n  + **HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n  + **SMB1910 (Comware 5) - Version: R1111**\n    * HP Network Products\n      - JG540A HP 1910-48 Switch\n      - JG539A HP 1910-24-PoE+ Switch\n      - JG538A HP 1910-24 Switch\n      - JG537A HP 1910-8 -PoE+ Switch\n      - JG536A HP 1910-8 Switch\n  + **SMB1920 (Comware 5) - Version: R1109**\n    * HP Network Products\n      - JG928A HP 1920-48G-PoE+ (370W) Switch\n      - JG927A HP 1920-48G Switch\n      - JG926A HP 1920-24G-PoE+ (370W) Switch\n      - JG925A HP 1920-24G-PoE+ (180W) Switch\n      - JG924A HP 1920-24G Switch\n      - JG923A HP 1920-16G Switch\n      - JG922A HP 1920-8G-PoE+ (180W) Switch\n      - JG921A HP 1920-8G-PoE+ (65W) Switch\n      - JG920A HP 1920-8G Switch\n  + **V1910 (Comware 5) - Version: R1516**\n    * HP Network Products\n      - JE005A HP 1910-16G Switch\n      - JE006A HP 1910-24G Switch\n      - JE007A HP 1910-24G-PoE (365W) Switch\n      - JE008A HP 1910-24G-PoE(170W) Switch\n      - JE009A HP 1910-48G Switch\n      - JG348A HP 1910-8G Switch\n      - JG349A HP 1910-8G-PoE+ (65W) Switch\n      - JG350A HP 1910-8G-PoE+ (180W) Switch\n  + **SMB 1620 (Comware 5) - Version: R1108**\n    * HP Network Products\n      - JG914A HP 1620-48G Switch\n      - JG913A HP 1620-24G Switch\n      - JG912A HP 1620-8G Switch\n\n**COMWARE 7 Products**\n\n  + **12500 (Comware 7) - Version: R7376**\n    * HP Network Products\n      - JC072B HP 12500 Main Processing Unit\n      - JC085A HP A12518 Switch Chassis\n      - JC086A HP A12508 Switch Chassis\n      - JC652A HP 12508 DC Switch Chassis\n      - JC653A HP 12518 DC Switch Chassis\n      - JC654A HP 12504 AC Switch Chassis\n      - JC655A HP 12504 DC Switch Chassis\n      - JF430A HP A12518 Switch Chassis\n      - JF430B HP 12518 Switch Chassis\n      - JF430C HP 12518 AC Switch Chassis\n      - JF431A HP A12508 Switch Chassis\n      - JF431B HP 12508 Switch Chassis\n      - JF431C HP 12508 AC Switch Chassis\n      - JG497A HP 12500 MPU w/Comware V7 OS\n      - JG782A HP FF 12508E AC Switch Chassis\n      - JG783A HP FF 12508E DC Switch Chassis\n      - JG784A HP FF 12518E AC Switch Chassis\n      - JG785A HP FF 12518E DC Switch Chassis\n      - JG802A HP FF 12500E MPU\n  + **10500 (Comware 7) - Version: R7170**\n    * HP Network Products\n      - JC611A HP 10508-V Switch Chassis\n      - JC612A HP 10508 Switch Chassis\n      - JC613A HP 10504 Switch Chassis\n      - JC748A HP 10512 Switch Chassis\n      - JG608A HP FlexFabric 11908-V Switch Chassis\n      - JG609A HP FlexFabric 11900 Main Processing Unit\n      - JG820A HP 10504 TAA Switch Chassis\n      - JG821A HP 10508 TAA Switch Chassis\n      - JG822A HP 10508-V TAA Switch Chassis\n      - JG823A HP 10512 TAA Switch Chassis\n      - JG496A HP 10500 Type A MPU w/Comware v7 OS\n      - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n      - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System\nMain Processing Unit\n  + **12900 (Comware 7) - Version: R1138P01**\n    * HP Network Products\n      - JG619A HP FlexFabric 12910 Switch AC Chassis\n      - JG621A HP FlexFabric 12910 Main Processing Unit\n      - JG632A HP FlexFabric 12916 Switch AC Chassis\n      - JG634A HP FlexFabric 12916 Main Processing Unit\n      - JH104A HP FlexFabric 12900E Main Processing Unit\n      - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n      - JH263A HP FlexFabric 12904E Main Processing Unit\n      - JH255A HP FlexFabric 12908E Switch Chassis\n      - JH262A HP FlexFabric 12904E Switch Chassis\n      - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n      - JH103A HP FlexFabric 12916E Switch Chassis\n  + **5900 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JC772A HP 5900AF-48XG-4QSFP+ Switch\n      - JG296A HP 5920AF-24XG Switch\n      - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n      - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n      - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n      - JG555A HP 5920AF-24XG TAA Switch\n      - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n      - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n      - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n      - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n  + **MSR1000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG875A HP MSR1002-4 AC Router\n      - JH060A HP MSR1003-8S AC Router\n  + **MSR2000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG411A HP MSR2003 AC Router\n      - JG734A HP MSR2004-24 AC Router\n      - JG735A HP MSR2004-48 Router\n      - JG866A HP MSR2003 TAA-compliant AC Router\n  + **MSR3000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG404A HP MSR3064 Router\n      - JG405A HP MSR3044 Router\n      - JG406A HP MSR3024 AC Router\n      - JG407A HP MSR3024 DC Router\n      - JG408A HP MSR3024 PoE Router\n      - JG409A HP MSR3012 AC Router\n      - JG410A HP MSR3012 DC Router\n      - JG861A HP MSR3024 TAA-compliant AC Router\n  + **MSR4000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG402A HP MSR4080 Router Chassis\n      - JG403A HP MSR4060 Router Chassis\n      - JG412A HP MSR4000 MPU-100 Main Processing Unit\n      - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n  + **VSR (Comware 7) - Version: E0321P01**\n    * HP Network Products\n      - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n      - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n      - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n      - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n  + **7900 (Comware 7) - Version: R2138P01**\n    * HP Network Products\n      - JG682A HP FlexFabric 7904 Switch Chassis\n      - JG841A HP FlexFabric 7910 Switch Chassis\n      - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n      - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n      - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n      - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n      - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n      - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n  + **5130 (Comware 7) - Version: R3109P16**\n    * HP Network Products\n      - JG932A HP 5130-24G-4SFP+ EI Switch\n      - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n      - JG934A HP 5130-48G-4SFP+ EI Switch\n      - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n      - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n      - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n      - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n      - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n      - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n      - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n      - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n  + **5700 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n      - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n      - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n      - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n      - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n      - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n  + **5930 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JG726A HP FlexFabric 5930 32QSFP+ Switch\n      - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n      - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n      - JH179A HP FlexFabric 5930 4-slot Switch\n      - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n      - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n  + **HSR6600 (Comware 7) - Version: R7103P05**\n    * HP Network Products\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n  + **HSR6800 (Comware 7) - Version: R7103P05**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing\n      - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit\n  + **1950 (Comware 7) - Version: R3109P16**\n    * HP Network Products\n      - JG960A HP 1950-24G-4XG Switch\n      - JG961A HP 1950-48G-2SFP+-2XGT Switch\n      - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch\n      - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch\n  + **7500 (Comware 7) - Version: R7170**\n    * HP Network Products\n      - JD238C HP 7510 Switch Chassis\n      - JD239C HP 7506 Switch Chassis\n      - JD240C HP 7503 Switch Chassis\n      - JD242C HP 7502 Switch Chassis\n      - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only\nMain Processing Unit\n      - JH208A HP 7502 Main Processing Unit\n      - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port\n40GbE QSFP+ Main Processing Unit\n\n**iMC Products**\n\n  + **iMC Plat - Version: iMC Plat 7.1 E0303P16**\n    * HP Network Products\n      - JD125A  HP IMC Std S/W Platform w/100-node\n      - JD126A  HP IMC Ent S/W Platform w/100-node\n      - JD808A  HP IMC Ent Platform w/100-node License\n      - JD814A   HP A-IMC Enterprise Edition Software DVD Media\n      - JD815A  HP IMC Std Platform w/100-node License\n      - JD816A  HP A-IMC Standard Edition Software DVD Media\n      - JF288AAE  HP Network Director to Intelligent Management Center\nUpgrade E-LTU\n      - JF289AAE  HP Enterprise Management System to Intelligent Management\nCenter Upgrade E-LTU\n      - JF377A  HP IMC Std S/W Platform w/100-node Lic\n      - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU\n      - JF378A  HP IMC Ent S/W Platform w/200-node Lic\n      - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU\n      - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU\n      - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\n      - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU\n      - JG550AAE  HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU\n      - JG590AAE  HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU\n      - JG659AAE  HP IMC Smart Connect VAE E-LTU\n      - JG660AAE  HP IMC Smart Connect w/WLM VAE E-LTU\n      - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU\n      - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU\n      - JG766AAE  HP IMC SmCnct Vrtl Applnc SW E-LTU\n      - JG767AAE  HP IMC SmCnct WSM Vrtl Applnc SW E-LTU\n      - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU\n  + **iMC iNode - Version: iNode PC 7.1 E0313, or, iNode PC 7.2 (E0401)**\n    * HP Network Products\n      - JD144A HP A-IMC User Access Management Software Module with 200-user\nLicense\n      - JD147A HP IMC Endpoint Admission Defense Software Module with\n200-user License\n      - JD435A HP A-IMC Endpoint Admission Defense Client Software\n      - JF388A HP IMC User Authentication Management Software Module with\n200-user License\n      - JF388AAE HP IMC User Authentication Management Software Module with\n200-user E-LTU\n      - JF391A HP IMC Endpoint Admission Defense Software Module with\n200-user License\n      - JF391AAE HP IMC Endpoint Admission Defense Software Module with\n200-user E-LTU\n      - JG752AAE HP IMC User Access Manager Software Module with 50-user\nE-LTU\n      - JG754AAE) HP IMC Endpoint Admission Defense Software Module with\n50-user E-LTU\n  + **iMC TAM_UAM - Version: iMC UAM_TAM 7.1 (E0307)**\n    * HP Network Products\n      - JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE\n      - JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU\n      - JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU\n      - JG483A HP IMC TAM S/W MODULE W/100-NODE LIC\n      - JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU\n      - JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU\n  + **iMC NSM - Version: iMC WSM 7.1 E0303P10**\n    * HP Network Products\n      - JD456A HP IMC WSM Software Module with 50-Access Point License\n      - JF414A HP IMC Wireless Service Manager Software Module with 50-Access\nPoint License\n      - JF414AAE HP IMC Wireless Service Manager Software Module with\n50-Access Point E-LTU\n      - JG551AAE HP PCM+ Mobility Manager to IMC Wireless Service Manager\nModule Upgrade with 250 Access Point E-LTU\n      - JG758AAE HP IMC WSM/RTLS w/ 50-node E-LTU\n      - JG769AAE HP PCM Mobility Manager to IMC Wireless Service Manager Upg\nwith 250-node E-LTU\n\n**VCX Products**\n\n  + **VCX - Version: 9.8.18**\n    * HP Network Products\n      - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr\n      - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr\n      - JC517A HP VCX V7205 Platform w/DL 360 G6 Server\n      -  JE355A HP VCX V6000 Branch Platform 9.0\n      - JC516A HP VCX V7005 Platform w/DL 120 G6 Server\n      - JC518A HP VCX Connect 200 Primry 120 G6 Server\n      - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr\n      - JE341A HP VCX Connect 100 Secondary\n      - JE252A HP VCX Connect Primary MIM Module\n      - JE253A HP VCX Connect Secondary MIM Module\n      - JE254A HP VCX Branch MIM Module\n      - JE355A HP VCX V6000 Branch Platform 9.0\n      - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod\n      - JD023A HP MSR30-40 Router with VCX MIM Module\n      - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM\n      - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod\n      - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod\n      - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod\n      - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS\n      - JE340A HP VCX Connect 100 Pri Server 9.0\n      - JE342A HP VCX Connect 100 Sec Server 9.0\n\nHISTORY\nVersion:1 (rev.1) - 5 July 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security update\nAdvisory ID:       RHSA-2015:1115-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2015-1115.html\nIssue date:        2015-06-15\nCVE Names:         CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 \n                   CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nAn invalid free flaw was found in the way OpenSSL handled certain DTLS\nhandshake messages. A malicious DTLS client or server could cause a DTLS\nserver or client using OpenSSL to crash or, potentially, execute arbitrary\ncode. (CVE-2014-8176)\n\nA flaw was found in the way the OpenSSL packages shipped with Red Hat\nEnterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes()\nfunction. This issue could possibly cause a multi-threaded application\nusing OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216)\n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. (CVE-2015-1789)\n\nA race condition was found in the session handling code of OpenSSL. (CVE-2015-1791)\n\nA flaw was found in the way OpenSSL handled Cryptographic Message Syntax\n(CMS) messages. A CMS message with an unknown hash function identifier\ncould cause an application using OpenSSL to enter an infinite loop. \n(CVE-2015-1792)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash. \n(CVE-2015-1790)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and\nCVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan\nFratric as the original reporters of CVE-2014-8176, Robert Swiecki and\nHanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as\nthe original reporter of CVE-2015-1790, Emilia Käsper as the original\nreport of  CVE-2015-1791 and Johannes Bauer as the original reporter of\nCVE-2015-1792. \n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression\n1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time\n1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent\n1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function\n1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket\n1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nppc64:\nopenssl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.ael7b_1.8.src.rpm\n\nppc64le:\nopenssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64le:\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-8176\nhttps://access.redhat.com/security/cve/CVE-2015-1789\nhttps://access.redhat.com/security/cve/CVE-2015-1790\nhttps://access.redhat.com/security/cve/CVE-2015-1791\nhttps://access.redhat.com/security/cve/CVE-2015-1792\nhttps://access.redhat.com/security/cve/CVE-2015-3216\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20150611.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk\nZyXizCcFL9oAQexObjxp/Mo=\n=PXiY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1n-i486-1_slack14.1.txz:  Upgraded. \n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n383ecfed6bfef1440a44d7082745848a  openssl-0.9.8zg-i486-1_slack13.0.txz\nfb186187ffa200e22d9450a9d0e321f6  openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\neb52318ed52fef726402f0b2a74745c5  openssl-0.9.8zg-x86_64-1_slack13.0.txz\n9447927b960a01b21149e28a9783021f  openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n37f46f6b4fe2acbe217eaf7c0b33b704  openssl-0.9.8zg-i486-1_slack13.1.txz\n986de2e71676f61d788a59a1e0c8de1f  openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n6b160ce817dcde3ae5b3a861b284387b  openssl-0.9.8zg-x86_64-1_slack13.1.txz\n503d891680c711162386ea7e3daadca8  openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n5e7501b1d73d01d3d87704c3cfd3a888  openssl-0.9.8zg-i486-1_slack13.37.txz\n874f0b59870dd3f259640c9930a02f99  openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\nb6d91614458040d461dff3c3eab45206  openssl-0.9.8zg-x86_64-1_slack13.37.txz\nbe106df5e59c2be7fa442df8ba85ad0b  openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nee7c3937e6a6d7ac7537f751af7da7b9  openssl-1.0.1n-i486-1_slack14.0.txz\n758662437d33f99ec0a686cedeb1919e  openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n2dfdc4729e93cf460018e9e30a6223dc  openssl-1.0.1n-x86_64-1_slack14.0.txz\n9cb4b34e97e60f6bfe4c843aabeae954  openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n5a9bf08d55615cfc097109c2e3786f7b  openssl-1.0.1n-i486-1_slack14.1.txz\nfb1c05468e5c38d51a8ff6ac435e3a20  openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\n1ef5cede3f954c3e4741012ffa76b750  openssl-1.0.1n-x86_64-1_slack14.1.txz\nea22c288c60ae1d7ea8c5b3a1608462b  openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n56db8712d653c060f910e8915a8f8656  a/openssl-solibs-1.0.1n-i586-1.txz\n6d6264c9943e27240db5c8f5ec342e27  n/openssl-1.0.1n-i586-1.txz\n\nSlackware x86_64 -current packages:\ne73f7aff5aa0ad14bc06428544f99ae2  a/openssl-solibs-1.0.1n-x86_64-1.txz\n91b550b9eb0ac0c580e158375a93c0e4  n/openssl-1.0.1n-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "BID",
            id: "75161",
         },
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-1791",
            trust: 3.7,
         },
         {
            db: "BID",
            id: "75161",
            trust: 2,
         },
         {
            db: "JUNIPER",
            id: "JSA10694",
            trust: 2,
         },
         {
            db: "JUNIPER",
            id: "JSA10733",
            trust: 2,
         },
         {
            db: "BID",
            id: "91787",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1032479",
            trust: 1.7,
         },
         {
            db: "MCAFEE",
            id: "SB10122",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91445763",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-1791",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169629",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132973",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137772",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132313",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132285",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136989",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137292",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "BID",
            id: "75161",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   id: "VAR-201506-0496",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.27443620166666666,
   },
   last_update_date: "2024-11-29T20:35:54.485000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205031",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/HT205031",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl",
         },
         {
            title: "Fix race condition in NewSessionTicket",
            trust: 0.8,
            url: "https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc",
         },
         {
            title: "HPSBUX03388",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&amp;m=143880121627664&amp;w=2",
         },
         {
            title: "HPSBMU03546",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05045763",
         },
         {
            title: "アライドテレシス株式会社からの情報",
            trust: 0.8,
            url: "http://jvn.jp/vu/JVNVU91445763/522154/index.html",
         },
         {
            title: "NV15-010",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv15-010.html",
         },
         {
            title: "OpenSSL vulnerabilities",
            trust: 0.8,
            url: "https://www.openssl.org/news/vulnerabilities.html",
         },
         {
            title: "Tarballs",
            trust: 0.8,
            url: "https://www.openssl.org/source/",
         },
         {
            title: "[11 Jun 2015] DHE man-in-the-middle protection (Logjam)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016verbose-2881725.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015verbose-2367954.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html",
         },
         {
            title: "Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            title: "October 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2015_critical_patch_update",
         },
         {
            title: "July 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/july_2016_critical_patch_update",
         },
         {
            title: "January 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2016_critical_patch_update",
         },
         {
            title: "October 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2016_critical_patch_update",
         },
         {
            title: "JSA10694",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
         },
         {
            title: "TLSA-2015-14",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2015/TLSA-2015-14j.html",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1129/1129443_cisco-sa-20150612-openssl-j.html",
         },
         {
            title: "openssl-1.0.0s",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56611",
         },
         {
            title: "openssl-0.9.8zg",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56610",
         },
         {
            title: "openssl-1.0.2b",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56613",
         },
         {
            title: "openssl-1.0.1n",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56612",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/",
         },
         {
            title: "Red Hat: CVE-2015-1791",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1791",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2639-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-550",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-550",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150612-openssl",
         },
         {
            title: "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/No-25-Miner/VulSeeker-master ",
         },
         {
            title: "FirmKit",
            trust: 0.1,
            url: "https://github.com/SysSec-KAIST/FirmKit ",
         },
         {
            title: "BinSeeker",
            trust: 0.1,
            url: "https://github.com/buptsseGJ/BinSeeker ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            trust: 2.1,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1115.html",
         },
         {
            trust: 2,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10694",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 2,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl",
         },
         {
            trust: 2,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.8,
            url: "https://security.gentoo.org/glsa/201506-02",
         },
         {
            trust: 1.7,
            url: "https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc",
         },
         {
            trust: 1.7,
            url: "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/kb/ht205031",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05157667",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/91787",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/75161",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733",
         },
         {
            trust: 1.7,
            url: "https://openssl.org/news/secadv/20150611.txt",
         },
         {
            trust: 1.7,
            url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa98",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05353965",
         },
         {
            trust: 1.7,
            url: "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc",
         },
         {
            trust: 1.7,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10122",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160647.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160436.html",
         },
         {
            trust: 1.7,
            url: "http://www.ubuntu.com/usn/usn-2639-1",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1032479",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2015/dsa-3287",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 0.9,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu91445763/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1791",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.4,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.4,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962775",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965845",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/13",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05353965",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/135",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05157667",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005313",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005376",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962520",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963232",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963954",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966723",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022724",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012435",
         },
         {
            trust: 0.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-15-014/",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/5438/security-advisory-alienvault-v5-0-4-addresses-31-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962726",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963964",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962039",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022647",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961800",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963096",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960713",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964033",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964441",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960157",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961179",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962493",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962623",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=0&uid=swg21963438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959518",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961569",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964113",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005314",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005373",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005434",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960045",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961837",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966481",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966484",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966847",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966873",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968871",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970020",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21971238",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966381",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-1791",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1793",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.2,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/362.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/no-25-miner/vulseeker-master",
         },
         {
            trust: 0.1,
            url: "https://github.com/syssec-kaist/firmkit",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2639-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=47152",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3286",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.1,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?doci",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/swpublishing/mtx-b59b11be53744759a650eadeb4",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/sim",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7995",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2007-6750",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3237",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2015",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0728",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7547",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2011-4969",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightcontrol",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "BID",
            id: "75161",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            db: "BID",
            id: "75161",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-06-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            date: "2015-06-11T00:00:00",
            db: "BID",
            id: "75161",
         },
         {
            date: "2015-06-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            date: "2015-06-11T12:12:12",
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            date: "2015-08-06T10:10:00",
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            date: "2015-06-22T14:14:00",
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            date: "2016-07-05T18:18:00",
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            date: "2015-06-15T23:37:59",
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            date: "2015-06-12T13:17:58",
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            date: "2016-05-13T16:14:13",
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            date: "2016-06-02T19:12:12",
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2015-06-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            date: "2015-06-12T19:59:04.397000",
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-12-13T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1791",
         },
         {
            date: "2017-05-23T16:28:00",
            db: "BID",
            id: "75161",
         },
         {
            date: "2017-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
         {
            date: "2024-11-21T02:26:08.920000",
            db: "NVD",
            id: "CVE-2015-1791",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  ssl/s3_clnt.c of  ssl3_get_new_session_ticket Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003083",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "competition condition problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-247",
         },
      ],
      trust: 0.6,
   },
}

var-201410-0371
Vulnerability from variot

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. ============================================================================ Ubuntu Security Notice USN-2385-1 October 16, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenSSL. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.7

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.20

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.22

After a standard system update you need to reboot your computer to make all the necessary changes.

Release Date: 2015-04-01 Last Updated: 2015-04-01

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH), HP Smart Update Manager (SUM), and HP Version Control Agent (VCA) which are components of HP Insight Control server deployment. These vulnerabilities are related to the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE". The components of HP Insight Control server deployment could be exploited remotely to allow disclosure of information.

HP Insight Control server deployment includes HP System Management Homepage (SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and deploys them through the following jobs. This bulletin provides the information needed to update the vulnerable components in HP Insight Control server deployment.

Install HP Management Agents for Windows x86/x64 Install HP Management Agents for RHEL 5 x64 Install HP Management Agents for RHEL 6 x64 Install HP Management Agents for SLES 10 x64 Install HP Management Agents for SLES 11 x64 Upgrade Proliant Firmware

References:

CVE-2014-3508 CVE-2014-3509 CVE-2014-3511 CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-5139 SSRT102004

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following instructions to resolve this vulnerability.

Note: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and v7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11 mentioned below to resolve the vulnerability.

Delete the files smh.exe from Component Copy Location listed in the following table, rows 1 and 2. Delete the files vca.exe/vcaamd64-.exe from Component Copy Location listed in the following table, rows 3 and 4. Delete the files hpsmh-7..rpm" from Component Copy Location listed in row 5. In sequence, perform the steps from left to right in the following table. First, download components from Download Link; Second, rename the component as suggested in Rename to. Third, copy the component to the location specified in Component Copy Location. Table Row Number Download Link Rename to Component Copy Location

1 http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe smhamd64-cp023964.exe \express\hpfeatures\hpagents-ws\components\Win2008

2 http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c smhx86-cp023963.exe \express\hpfeatures\hpagents-ws\components\Win2008

3 http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb vcax86 cp025295.exe \express\hpfeatures\hpagents-ws\components\Win2008

4 http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4 vcaamd64-cp025296.exe \express\hpfeatures\hpagents-ws\components\Win2008

5 http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723 Do not rename the downloaded component for this step. \express\hpfeatures\hpagents-sles11-x64\components

\express\hpfeatures\hpagents-sles10-x64\components

\express\hpfeatures\hpagents-rhel5-x64\components

\express\hpfeatures\hpagents-rhel6-x64\components

6 http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133 Do not rename the downloaded component for this step. \express\hpfeatures\hpagents-sles11-x64\components

\express\hpfeatures\hpagents-sles10-x64\components

\express\hpfeatures\hpagents-rhel5-x64\components

\express\hpfeatures\hpagents-rhel6-x64\components

7 http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1 smhx86-cp025274.exe \express\hpfeatures\hpagents-ws\components\Win2003

8 http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd smhamd64-cp025275.exe \express\hpfeatures\hpagents-ws\components\Win2003

Download and extract the HP SUM component from ftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346

Copy all content from extracted folder and paste at \eXpress\hpfeatures\fw-proLiant\components Initiate Install HP Management Agents for SLES 11 x64 on the target running SLES11 x64. Initiate Install HP Management Agents for SLES 10 x64 on the target running SLES10 x64. Initiate Install HP Management Agents for RHEL 6 x64 on the target running RHEL 6 x64. Initiate Install HP Management Agents for RHEL 5 x64 on the target running RHEL 5 x64. Initiate Install HP Management Agents for Windows x86/x64 job on the target running Windows.

HISTORY Version:1 (rev.1) - 1 April 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2014:1652-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html Issue date: 2014-10-16 CVE Names: CVE-2014-3513 CVE-2014-3567 =====================================================================

  1. Summary:

Updated openssl packages that contain a backported patch to mitigate the CVE-2014-3566 issue and fix two security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.

This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails.

This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication.

For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123

A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. (CVE-2014-3513)

A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567)

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-30.el6_6.2.src.rpm

i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-30.el6_6.2.src.rpm

x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-30.el6_6.2.src.rpm

i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm

ppc64: openssl-1.0.1e-30.el6_6.2.ppc.rpm openssl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm

s390x: openssl-1.0.1e-30.el6_6.2.s390.rpm openssl-1.0.1e-30.el6_6.2.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-devel-1.0.1e-30.el6_6.2.s390.rpm openssl-devel-1.0.1e-30.el6_6.2.s390x.rpm

x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-static-1.0.1e-30.el6_6.2.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-perl-1.0.1e-30.el6_6.2.s390x.rpm openssl-static-1.0.1e-30.el6_6.2.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-30.el6_6.2.src.rpm

i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-34.el7_0.6.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-34.el7_0.6.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-34.el7_0.6.src.rpm

ppc64: openssl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm

s390x: openssl-1.0.1e-34.el7_0.6.s390x.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-devel-1.0.1e-34.el7_0.6.s390.rpm openssl-devel-1.0.1e-34.el7_0.6.s390x.rpm openssl-libs-1.0.1e-34.el7_0.6.s390.rpm openssl-libs-1.0.1e-34.el7_0.6.s390x.rpm

x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-static-1.0.1e-34.el7_0.6.ppc.rpm openssl-static-1.0.1e-34.el7_0.6.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-perl-1.0.1e-34.el7_0.6.s390x.rpm openssl-static-1.0.1e-34.el7_0.6.s390.rpm openssl-static-1.0.1e-34.el7_0.6.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-34.el7_0.6.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2014-3513.html https://www.redhat.com/security/data/cve/CVE-2014-3567.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1232123

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz qY686VXQQ02SLq5vTvKfuHk= =McEc -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1) 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE) 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE) 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-3513]. [CVE-2014-3567]. This protocol weakness makes it possible for an attacker to obtain clear text data through a padding-oracle attack.

Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE [CVE-2014-3566].

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade.

When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. [CVE-2014-3568].

III. [CVE-2014-3567].

An active man-in-the-middle attacker can force a protocol downgrade to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data from the connection. [CVE-2014-3566] [CVE-2014-3568]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc

gpg --verify openssl-10.0.patch.asc

[FreeBSD 9.3]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc

gpg --verify openssl-9.3.patch.asc

[FreeBSD 8.4, 9.1 and 9.2]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r273151 releng/8.4/ r273416 stable/9/ r273151 releng/9.1/ r273415 releng/9.2/ r273415 releng/9.3/ r273415 stable/10/ r273149 releng/10.0/ r273415 releng/10.1/ r273399


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

APPLE-SA-2015-09-16-2 Xcode 7.0

Xcode 7.0 is now available and addresses the following:

DevTools Available for: OS X Yosemite v10.10.4 or later Impact: An attacker may be able to bypass access restrictions Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version. CVE-ID CVE-2015-3185 : Branko Aibej of the Apache Software Foundation

IDE Xcode Server Available for: OS X Yosemite 10.10 or later Impact: An attacker may be able to access restricted parts of the filesystem Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3. CVE-ID CVE-2014-6394 : Ilya Kantor

IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilties in OpenSSL Description: Multiple vulnerabilties existed in the node.js OpenSSL module prior to version 1.0.1j. CVE-ID CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568

IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic. CVE-ID CVE-2015-5910 : an anonymous researcher

IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Build notifications may be sent to unintended recipients Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation. CVE-ID CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree

subversion Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19 Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20. CVE-ID CVE-2015-0248 CVE-2015-0251

Xcode 7.0 may be obtained from: https://developer.apple.com/xcode/downloads/

To check that the Xcode has been updated:

  • Select Xcode in the menu bar
  • Select About Xcode
  • The version after applying this update will be "7.0".

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded. ( Security fix ) patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz: Upgraded. For more information, see: https://www.openssl.org/news/secadv_20141015.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz 8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz 21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz 5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: 94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz 2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz fedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz 6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz

Slackware 14.0 packages: 2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz f7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz 40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz 0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: d07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz 1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz

Slackware -current packages: 53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz cc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz

Slackware x86_64 -current packages: 500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz c483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.

References:

CVE-2014-3513 CVE-2014-3567 SSRT101917

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier.

Go to http://www.hp.com/go/oa

Select "Onboard Administrator Firmware" Select product name as ""HP BLc3000 Onboard Administrator Option" or "HP BLc7000 Onboard Administrator Option" Select the operating system from the list of choices Select Firmware version 4.40 for download Refer to the HP BladeSystem Onboard Administrator User Guide for steps to update the Onboard Administrator firmware. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected.

This issue was reported to OpenSSL on 26th September 2014, based on an original issue and patch developed by the LibreSSL project. Further analysis of the issue was performed by the OpenSSL team.

The fix was developed by the OpenSSL team.

This issue was reported to OpenSSL on 8th October 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 https://www.openssl.org/~bodo/ssl-poodle.pdf

Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.

This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.

The fix was developed by Akamai and the OpenSSL team.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20141015.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

. Summary

VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. Relevant Releases

VMware Workstation 10.x prior to version 10.0.5

VMware Player 6.x prior to version 6.0.5

VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5

vCenter Server 5.5 prior to Update 2d

ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG

  1. Problem Description

a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability

  VMware ESXi, Workstation, Player and Fusion contain an arbitrary 
  file write issue. Exploitation this issue may allow for privilege
  escalation on the host.

  The vulnerability does not allow for privilege escalation from 
  the guest Operating System to the host or vice-versa. This means
  that host memory can not be manipulated from the Guest Operating
  System.

  Mitigation

  For ESXi to be affected, permissions must have been added to ESXi
  (or a vCenter Server managing it) for a virtual machine 
  administrator role or greater.

  VMware would like to thank Shanon Olsson for reporting this issue to
  us through JPCERT.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the identifier CVE-2014-8370 to this issue.

  Column 4 of the following table lists the action required to
  remediate the vulnerability in each release, if a solution is 
  available.

  VMware         Product    Running   Replace with/
  Product        Version    on        Apply Patch
  =============  =======    =======   =================
  Workstation    11.x       any       not affected
  Workstation    10.x       any       10.0.5

  Player         7.x        any       not affected
  Player         6.x        any       6.0.5

  Fusion         7.x        any       not affected
  Fusion         6.x        any       6.0.5

  ESXi           5.5        ESXi      ESXi550-201403102-SG
  ESXi           5.1        ESXi      ESXi510-201404101-SG 
  ESXi           5.0        ESXi      ESXi500-201405101-SG

b. VMware Workstation, Player, and Fusion Denial of Service vulnerability

  VMware Workstation, Player, and Fusion contain an input validation 
  issue in the Host Guest File System (HGFS). This issue may allow
  for a Denial of Service of the Guest Operating system.

  VMware would like to thank Peter Kamensky from Digital Security for 
  reporting this issue to us.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the identifier CVE-2015-1043 to this issue.

  Column 4 of the following table lists the action required to
  remediate the vulnerability in each release, if a solution is 
  available.

  VMware         Product    Running   Replace with/
  Product        Version    on        Apply Patch
  =============  =======    =======   =================
  Workstation    11.x       any       not affected
  Workstation    10.x       any       10.0.5

  Player         7.x        any       not affected
  Player         6.x        any       6.0.5

  Fusion         7.x        any       7.0.1
  Fusion         6.x        any       6.0.5

c. VMware ESXi, Workstation, and Player Denial of Service vulnerability

  VMware ESXi, Workstation, and Player contain an input
  validation issue in VMware Authorization process (vmware-authd). 
  This issue may allow for a Denial of Service of the host. On 
  VMware ESXi and on Workstation running on Linux the Denial of
  Service would be partial.

  VMware would like to thank Dmitry Yudin @ret5et for reporting
  this issue to us through HP's Zero Day Initiative.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the identifier CVE-2015-1044 to this issue.

  Column 4 of the following table lists the action required to
  remediate the vulnerability in each release, if a solution is 
  available.

  VMware         Product    Running   Replace with/
  Product        Version    on        Apply Patch
  =============  =======    =======   =================
  Workstation    11.x       any       not affected
  Workstation    10.x       any       10.0.5

  Player         7.x        any       not affected
  Player         6.x        any       6.0.5

  Fusion         7.x        any       not affected
  Fusion         6.x        any       not affected

  ESXi           5.5        ESXi      ESXi550-201501101-SG
  ESXi           5.1        ESXi      ESXi510-201410101-SG
  ESXi           5.0        ESXi      not affected

d.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the names CVE-2014-3513, CVE-2014-3567, 
  CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.

  Column 4 of the following table lists the action required to
  remediate the vulnerability in each release, if a solution is
  available.

  VMware         Product    Running   Replace with/
  Product        Version    on        Apply Patch
  =============  =======    =======   =================
  vCenter Server 5.5        any       Update 2d*
  vCenter Server 5.1        any       patch pending
  vCenter Server 5.0        any       patch pending

  ESXi           5.5        ESXi      ESXi550-201501101-SG       
  ESXi           5.1        ESXi      patch pending
  ESXi           5.0        ESXi      patch pending

  * The VMware vCenter 5.5 SSO component will be 
    updated in a later release

e. Update to ESXi libxml2 package

  The libxml2 library is updated to version libxml2-2.7.6-17
  to resolve a security issue.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the name CVE-2014-3660 to this issue.

  Column 4 of the following table lists the action required to
  remediate the vulnerability in each release, if a solution is
  available.

  VMware         Product    Running   Replace with/
  Product        Version    on        Apply Patch
  =============  =======    =======   =================
  ESXi           5.5        ESXi      ESXi550-201501101-SG     
  ESXi           5.1        ESXi      patch pending
  ESXi           5.0        ESXi      patch pending
  1. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

VMware Workstation 10.x


https://www.vmware.com/go/downloadworkstation

VMware Player 6.x


https://www.vmware.com/go/downloadplayer

VMware Fusion 7.x and 6.x


https://www.vmware.com/go/downloadplayer

vCenter Server


Downloads and Documentation: https://www.vmware.com/go/download-vsphere

ESXi 5.5 Update 2d


File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG

ESXi 5.5


File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG

ESXi 5.1


File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG

ESXi 5.0


File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG

  1. Change log

2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories http://www.vmware.com/security/advisories

Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735

VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html

Twitter https://twitter.com/VMwareSRC

Copyright 2015 VMware Inc. All rights reserved

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201410-0371",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "flex system chassis management module",
            scope: null,
            trust: 3.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 1.8,
            vendor: "ibm",
            version: "1.50.1",
         },
         {
            model: "flex system chassis management module 1.1.1",
            scope: null,
            trust: 1.2,
            vendor: "ibm",
            version: null,
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "bladecenter advanced management module 3.66n",
            scope: "ne",
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter advanced management module 3.66k",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "7.0",
         },
         {
            model: "xcode",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "(os x yosemite v10.10.4 or later )",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "flex system chassis management module 1.50.0",
            scope: null,
            trust: 0.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "global console manager",
            scope: "ne",
            trust: 0.6,
            vendor: "ibm",
            version: "1.26.1.23978",
         },
         {
            model: "global console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.4.2.15036",
         },
         {
            model: "global console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.20.20.23447",
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.50.0",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "local console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.39.0",
         },
         {
            model: "local console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.27.00",
         },
         {
            model: "local console manager",
            scope: "ne",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.40.00",
         },
         {
            model: "flex system chassis management module 1.40.1",
            scope: null,
            trust: 0.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet23g-2.06",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "rational software architect realtime edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "bladecenter advanced management module 25r5778",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "q",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1948",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.11",
         },
         {
            model: "k",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.21",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.5",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "flex system chassis management module 1.20.2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "connect:enterprise secure client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.0",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudsystem enterprise software",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.2",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "norman shark scada protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.1",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "j",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl 1.0.1j",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "wb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.2.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.1.0",
         },
         {
            model: "n",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "policycenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "project openssl 1.0.0o",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "pa",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "m210",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "vsr1000",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system ib6131 40gb infiniband switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.40",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5.2",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "119000",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.2",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "10.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "norman shark network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet21c-2.04",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "norman shark scada protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "megaraid storage manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "15.03.01.00",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8720",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.23",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.4",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.22",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70000",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "r2122",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7900",
         },
         {
            model: "flex system chassis management module 1.40.2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.1",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "netcool/system service monitor fp1 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0-",
         },
         {
            model: "flex system en6131 40gb ethernet switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.1",
         },
         {
            model: "flex system ib6131 40gb infiniband switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4.1110",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.3",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1",
         },
         {
            model: "policycenter",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2.10",
         },
         {
            model: "netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8886",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "office connect ps1810",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "aura communication manager ssp04",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "ex series network switches for ibm products pre 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.0",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "m.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.3",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "connect:enterprise command line client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "79000",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "aspera proxy",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "aspera mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "cloudsystem foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "h.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.20",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "norman shark scada protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7967",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "aspera drive",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.9",
         },
         {
            model: "content analysis system",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.53",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system chassis management module 1.20.1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security analytics platform",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6.10",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "norman shark scada protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.3.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "12500(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v7)0",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8852",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8750",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "57000",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5.0",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5",
         },
         {
            model: "r",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "norman shark network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.0.1",
         },
         {
            model: "esxi esxi550-20150110",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "kb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.8.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129000",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24d-2.08",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.6",
         },
         {
            model: "i.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.2",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.0",
         },
         {
            model: "m.08",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.1",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.8",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-493",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.8",
         },
         {
            model: "ssl visibility 3.8.2f",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.6",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.6",
         },
         {
            model: "rational software architect realtime edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0",
         },
         {
            model: "director",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.16.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-109",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.4",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "vb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1881",
         },
         {
            model: "connect:enterprise secure client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56001",
         },
         {
            model: "ka",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.2",
         },
         {
            model: "security analytics platform",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1.6",
         },
         {
            model: "office connect pk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v5000-",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet21e-2.05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "norman shark network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.3.2",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "yb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.1",
         },
         {
            model: "flex system chassis management module 1.40.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24b-2.07",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "flex system fc3171 8gb san switch and san pass-thru",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.5.03.00",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "aspera ondemand for google cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.8.2.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.21",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.0",
         },
         {
            model: "aura utility services sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.5.2",
         },
         {
            model: "aspera console",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.5.3",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "e",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.20",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7779",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.3",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.2",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.10",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.20",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.11",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aspera faspex",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "msr2000 r0106p18",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "va",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aspera ondemand for softlayer",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.4",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.4",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "aspera ondemand for azure",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5700",
         },
         {
            model: "aspera shares",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0",
         },
         {
            model: "qradar risk manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.46.4.2.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "aspera connect server",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "aspera client",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.20",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "aspera outlook plugin",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.4.2",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "system management homepage 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.131",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.5",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.7",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.3.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.1",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56003",
         },
         {
            model: "sterling connect:enterprise http option",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.2",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "flex system chassis management module 1.20.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.2",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-108",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "packetshaper",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2.10",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1.2",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloudsystem foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3.2",
         },
         {
            model: "ps110",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "aspera point to point",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.33",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.7",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.1.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70000",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "imc uam e0302p07",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v7)0",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.5",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "qradar vulnerability manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.8.1.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.1",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "ra",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tuxedo",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.1.0",
         },
         {
            model: "proxysg sgos",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.6.1",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.1.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "rf manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.9.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.6.0",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.1",
         },
         {
            model: "h.07",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-495",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2.2",
         },
         {
            model: "office connect pm",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "content analysis system",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1",
         },
         {
            model: "ya",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "switch series r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5900",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3",
         },
         {
            model: "bladecenter t advanced management module 32r0835",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.26.2.1.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.30",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.80",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "12500(comware r7328p04",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v7)",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.0.1",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.0",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "w",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.1.1",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.1.0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.7.0",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.2",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8730",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "pb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet13a-2.00",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.56.5.1.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "flex system chassis management module 1.1.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7989",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.10",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8740",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.4",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.7",
         },
         {
            model: "xcode",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "7.0",
         },
         {
            model: "switch series r2111p06",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11900",
         },
         {
            model: "imc uam",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.5",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "packetshaper",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "aspera orchestrator",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.10",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.0",
         },
         {
            model: "sterling connect:enterprise http option",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51300",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "y",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59200",
         },
         {
            model: "u",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.4.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.34",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "flex system chassis management module 2.5.3t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "l",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3500-",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "m220",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56002",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "flex system chassis management module 1.0.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "imc wsm",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "aspera ondemand for amazon",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.36.3.1.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1886",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3700-",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59000",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "msr2000",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.1",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8677",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet17a-2.02",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.2",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.1",
         },
         {
            model: "f",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24j-2.10",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aspera enterprise server",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "qradar risk manager mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "switch series r1005p15",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12900",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "office connect p",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "aspera orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "norman shark network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "oneview",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.20",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.10",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24g-2.09",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "manager for sle sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "111.7",
         },
         {
            model: "studio onsite",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "1.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.8",
         },
         {
            model: "cloudsystem foundation",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "office connect pl",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "content analysis system",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2.3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "reporter's iso",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.05",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "systems insight manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "t",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vsr1000 r0204p01",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3",
         },
         {
            model: "flex system en6131 40gb ethernet switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4.1110",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "switch series r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5920",
         },
         {
            model: "aspera point to point",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "ei switch series r3108p03",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5130",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:apple:xcode",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "131254",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2014-3513",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3513",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3513",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-3513",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3513",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. ============================================================================\nUbuntu Security Notice USN-2385-1\nOctober 16, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \nThis issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.7\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.20\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.22\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nRelease Date: 2015-04-01\nLast Updated: 2015-04-01\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH), HP Smart Update Manager (SUM), and HP Version\nControl Agent (VCA) which are components of HP Insight Control server\ndeployment. These vulnerabilities are related to the SSLv3 vulnerability\nknown as \"Padding Oracle on Downgraded Legacy Encryption\" or \"POODLE\". The\ncomponents of HP Insight Control server deployment could be exploited\nremotely to allow disclosure of information. \n\nHP Insight Control server deployment includes HP System Management Homepage\n(SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and\ndeploys them through the following jobs. This bulletin provides the\ninformation needed to update the vulnerable components in HP Insight Control\nserver deployment. \n\nInstall HP Management Agents for Windows x86/x64\nInstall HP Management Agents for RHEL 5 x64\nInstall HP Management Agents for RHEL 6 x64\nInstall HP Management Agents for SLES 10 x64\nInstall HP Management Agents for SLES 11 x64\nUpgrade Proliant Firmware\n\nReferences:\n\nCVE-2014-3508\nCVE-2014-3509\nCVE-2014-3511\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\nCVE-2014-5139\nSSRT102004\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-3508    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-3509    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3511    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2014-3513    (AV:N/AC:M/Au:N/C:N/I:N/A:C)       7.1\nCVE-2014-3566    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-3567    (AV:N/AC:M/Au:N/C:N/I:N/A:C)       7.1\nCVE-2014-3568    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2014-5139    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following instructions to resolve this vulnerability. \n\nNote: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and\nv7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11\nmentioned below to resolve the vulnerability. \n\nDelete the files smh*.exe from Component Copy Location listed in the\nfollowing table, rows 1 and 2. \nDelete the files vca*.exe/vcaamd64-*.exe from Component Copy Location listed\nin the following table, rows 3 and 4. \nDelete the files hpsmh-7.*.rpm\" from Component Copy Location listed in row 5. \nIn sequence, perform the steps from left to right in the following table. \nFirst, download components from Download Link; Second, rename the component\nas suggested in Rename to. Third, copy the component to the location\nspecified in Component Copy Location. \nTable Row Number\n Download Link\n Rename to\n Component Copy Location\n\n1\n http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe\n smhamd64-cp023964.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n2\n http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c\n smhx86-cp023963.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n3\n http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb\n vcax86 cp025295.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n4\n http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4\n vcaamd64-cp025296.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n5\n http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723\n Do not rename the downloaded component for this step. \n \\\\express\\hpfeatures\\hpagents-sles11-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-sles10-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel5-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel6-x64\\components\n\n6\n http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133\n Do not rename the downloaded component for this step. \n \\\\express\\hpfeatures\\hpagents-sles11-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-sles10-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel5-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel6-x64\\components\n\n7\n http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1\n smhx86-cp025274.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2003\n\n8\n http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd\n smhamd64-cp025275.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2003\n\nDownload and extract the HP SUM component from\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346\n\nCopy all content from extracted folder and paste at\n\\\\eXpress\\hpfeatures\\fw-proLiant\\components\nInitiate Install HP Management Agents for SLES 11 x64 on the target running\nSLES11 x64. \nInitiate Install HP Management Agents for SLES 10 x64 on the target running\nSLES10 x64. \nInitiate Install HP Management Agents for RHEL 6 x64 on the target running\nRHEL 6 x64. \nInitiate Install HP Management Agents for RHEL 5 x64 on the target running\nRHEL 5 x64. \nInitiate Install HP Management Agents for Windows x86/x64 job on the target\nrunning Windows. \n\nHISTORY\nVersion:1 (rev.1) - 1 April 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2014:1652-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-1652.html\nIssue date:        2014-10-16\nCVE Names:         CVE-2014-3513 CVE-2014-3567 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails. \n\nThis can prevent a forceful downgrade of the communication to SSL 3.0. \nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode. \nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication. \n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nppc64:\nopenssl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3513.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3567.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1232123\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz\nqY686VXQQ02SLq5vTvKfuHk=\n=McEc\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nCorrected:      2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1)\n                2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10)\n                2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE)\n                2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3)\n                2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13)\n                2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20)\n                2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE)\n                2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17)\nCVE Name:       CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII.  [CVE-2014-3513].  [CVE-2014-3567].  This\nprotocol weakness makes it possible for an attacker to obtain clear text\ndata through a padding-oracle attack. \n\nSome client applications (such as browsers) will reconnect using a\ndowngraded protocol to work around interoperability bugs in older\nservers. This could be exploited by an active man-in-the-middle to\ndowngrade connections to SSL 3.0 even if both sides of the connection\nsupport higher protocols. SSL 3.0 contains a number of weaknesses\nincluding POODLE [CVE-2014-3566]. \n\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\nto block the ability for a MITM attacker to force a protocol downgrade. \n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers\ncould accept and complete a SSL 3.0 handshake, and clients could be\nconfigured to send them. [CVE-2014-3568]. \n\nIII. \n[CVE-2014-3567]. \n\nAn active man-in-the-middle attacker can force a protocol downgrade\nto SSLv3 and exploit the weakness of SSLv3 to obtain clear text data\nfrom the connection. [CVE-2014-3566] [CVE-2014-3568]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 8.4, 9.1 and 9.2]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r273151\nreleng/8.4/                                                       r273416\nstable/9/                                                         r273151\nreleng/9.1/                                                       r273415\nreleng/9.2/                                                       r273415\nreleng/9.3/                                                       r273415\nstable/10/                                                        r273149\nreleng/10.0/                                                      r273415\nreleng/10.1/                                                      r273399\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-09-16-2 Xcode 7.0\n\nXcode 7.0 is now available and addresses the following:\n\nDevTools\nAvailable for:  OS X Yosemite v10.10.4 or later\nImpact:  An attacker may be able to bypass access restrictions\nDescription:  An API issue existed in the apache configuration. This\nissue was addressed by updating header files to use the latest\nversion. \nCVE-ID\nCVE-2015-3185 : Branko Aibej of the Apache Software Foundation\n\nIDE Xcode Server\nAvailable for:  OS X Yosemite 10.10 or later\nImpact:  An attacker may be able to access restricted parts of the\nfilesystem\nDescription:  A comparison issue existed in the node.js send module\nprior to version 0.8.4. This issue was addressed by upgrading to\nversion 0.12.3. \nCVE-ID\nCVE-2014-6394 : Ilya Kantor\n\nIDE Xcode Server\nAvailable for:  OS X Yosemite v10.10.4 or later\nImpact:  Multiple vulnerabilties in OpenSSL\nDescription:  Multiple vulnerabilties existed in the node.js OpenSSL\nmodule prior to version 1.0.1j. \nCVE-ID\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\n\nIDE Xcode Server\nAvailable for:  OS X Yosemite v10.10.4 or later\nImpact:  An attacker with a privileged network position may be able\nto inspect traffic to Xcode Server\nDescription:  Connections to Xcode Server may have been made without\nencryption. This issue was addressed through improved network\nconnection logic. \nCVE-ID\nCVE-2015-5910 : an anonymous researcher\n\nIDE Xcode Server\nAvailable for:  OS X Yosemite v10.10.4 or later\nImpact:  Build notifications may be sent to unintended recipients\nDescription:  An access issue existed in the handling of repository\nemail lists. This issue was addressed through improved validation. \nCVE-ID\nCVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of\nAnchorfree\n\nsubversion\nAvailable for:  OS X Yosemite v10.10.4 or later\nImpact:  Multiple vulnerabilities existed in svn versions prior to\n1.7.19\nDescription:  Multiple vulnerabilities existed in svn versions prior\nto 1.7.19. These issues were addressed by updating svn to version\n1.7.20. \nCVE-ID\nCVE-2015-0248\nCVE-2015-0251\n\n\nXcode 7.0 may be obtained from:\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"7.0\". \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz:  Upgraded. \n  (* Security fix *)\npatches/packages/openssl-1.0.1j-i486-1_slack14.1.txz:  Upgraded. \n  For more information, see:\n    https://www.openssl.org/news/secadv_20141015.txt\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n44d336a121b39296f0e6bbeeb283dd2b  openssl-0.9.8zc-i486-1_slack13.0.txz\n8342cfb351e59ecf5ea6d8cba66f0040  openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n671f12535bdc10ab24388b713351aca2  openssl-0.9.8zc-x86_64-1_slack13.0.txz\n21e380284cdfab2fd15fffe2e0aed526  openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n64cb819f1e07522bd5d7ceedd0a9ab50  openssl-0.9.8zc-i486-1_slack13.1.txz\n5fe4e385b2251cfd7e8ae5963ec6cef1  openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n94feb6699d6f2cc7750a6b2e17ccaaa2  openssl-0.9.8zc-x86_64-1_slack13.1.txz\n2c17e4286509c29074ab0168367b851e  openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n4483d91c776c7e23c59246c4e0aa24aa  openssl-0.9.8zc-i486-1_slack13.37.txz\nfedd58eb19bc13c9dd88d947827a7370  openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n5d48ac1e9339efc35e304c7d48b2e762  openssl-0.9.8zc-x86_64-1_slack13.37.txz\n6f5e2b576259477c13f12cbed9be8804  openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\n2b678160283bc696565dc8bd8b28c0eb  openssl-1.0.1j-i486-1_slack14.0.txz\nf7762615c990713e9e86d4da962f1022  openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n41010ca37d49b74e7d7dc3f1c6ddc57e  openssl-1.0.1j-x86_64-1_slack14.0.txz\n40dc6f3de217279d6140c1efcc0d45c8  openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n024ecea55e22e47f9fbb4b81a7b72a51  openssl-1.0.1j-i486-1_slack14.1.txz\n0a575668bb41ec4c2160800611f7f627  openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nd07fe289f7998a584c2b0d9810a8b9aa  openssl-1.0.1j-x86_64-1_slack14.1.txz\n1ffc5d0c02b0c60cefa5cf9189bfc71d  openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n53c9f51a79460bbfc5dec5720317cd53  a/openssl-solibs-1.0.1j-i486-1.txz\ncc059aa63494f3b005a886c70bc3f5d6  n/openssl-1.0.1j-i486-1.txz\n\nSlackware x86_64 -current packages:\n500709555e652adcd84b4e02dfab4eeb  a/openssl-solibs-1.0.1j-x86_64-1.txz\nc483ca9c450fa90a901ac013276ccc53  n/openssl-1.0.1j-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. \n\nReferences:\n\nCVE-2014-3513\nCVE-2014-3567\nSSRT101917\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier. \n\nGo to\nhttp://www.hp.com/go/oa\n\nSelect \"Onboard Administrator Firmware\"\nSelect product name as \"\"HP BLc3000 Onboard Administrator Option\" or \"HP\nBLc7000 Onboard Administrator Option\"\nSelect the operating system from the list of choices\nSelect Firmware version 4.40 for download\nRefer to the HP BladeSystem Onboard Administrator User Guide for steps to\nupdate the Onboard Administrator firmware. Implementations of OpenSSL that\nhave been compiled with OPENSSL_NO_SRTP defined are not affected. \n\nThis issue was reported to OpenSSL on 26th September 2014, based on an original\nissue and patch developed by the LibreSSL project. Further analysis of the issue\nwas performed by the OpenSSL team. \n\nThe fix was developed by the OpenSSL team. \n\nThis issue was reported to OpenSSL on 8th October 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nhttps://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00\nhttps://www.openssl.org/~bodo/ssl-poodle.pdf\n\nSupport for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller. \n\nThis issue was reported to OpenSSL by Akamai Technologies on 14th October 2014. \n\nThe fix was developed by Akamai and the OpenSSL team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20141015.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. Summary\n\n   VMware vCenter Server, ESXi, Workstation, Player and Fusion address\n   several security issues. Relevant Releases\n\n   VMware Workstation 10.x prior to version 10.0.5\n  \n   VMware Player 6.x prior to version 6.0.5\n\n   VMware Fusion 7.x prior to version 7.0.1\n   VMware Fusion 6.x prior to version 6.0.5\n\n   vCenter Server 5.5 prior to Update 2d\n\n   ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG\n   ESXi 5.1 without patch ESXi510-201404101-SG\n   ESXi 5.0 without patch ESXi500-201405101-SG\n\n3. Problem Description \n\n   a. VMware ESXi, Workstation, Player, and Fusion host privilege\n      escalation vulnerability\n\n      VMware ESXi, Workstation, Player and Fusion contain an arbitrary \n      file write issue. Exploitation this issue may allow for privilege\n      escalation on the host. \n\n      The vulnerability does not allow for privilege escalation from \n      the guest Operating System to the host or vice-versa. This means\n      that host memory can not be manipulated from the Guest Operating\n      System. \n\n      Mitigation\n      \n      For ESXi to be affected, permissions must have been added to ESXi\n      (or a vCenter Server managing it) for a virtual machine \n      administrator role or greater. \n\n      VMware would like to thank Shanon Olsson for reporting this issue to\n      us through JPCERT. \n\n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n      has assigned the identifier CVE-2014-8370 to this issue. \n\n      Column 4 of the following table lists the action required to\n      remediate the vulnerability in each release, if a solution is \n      available. \n\n      VMware         Product    Running   Replace with/\n      Product        Version    on        Apply Patch\n      =============  =======    =======   =================\n      Workstation    11.x       any       not affected\n      Workstation    10.x       any       10.0.5\n\n      Player         7.x        any       not affected\n      Player         6.x        any       6.0.5\n\n      Fusion         7.x        any       not affected\n      Fusion         6.x        any       6.0.5\n\n      ESXi           5.5        ESXi      ESXi550-201403102-SG\n      ESXi           5.1        ESXi      ESXi510-201404101-SG \n      ESXi           5.0        ESXi      ESXi500-201405101-SG\n\n   b. VMware Workstation, Player, and Fusion Denial of Service \n      vulnerability\n\n      VMware Workstation, Player, and Fusion contain an input validation \n      issue in the Host Guest File System (HGFS). This issue may allow\n      for a Denial of Service of the Guest Operating system. \n\n      VMware would like to thank Peter Kamensky from Digital Security for \n      reporting this issue to us. \n\n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n      has assigned the identifier CVE-2015-1043 to this issue. \n\n      Column 4 of the following table lists the action required to\n      remediate the vulnerability in each release, if a solution is \n      available. \n\n      VMware         Product    Running   Replace with/\n      Product        Version    on        Apply Patch\n      =============  =======    =======   =================\n      Workstation    11.x       any       not affected\n      Workstation    10.x       any       10.0.5\n\n      Player         7.x        any       not affected\n      Player         6.x        any       6.0.5\n\n      Fusion         7.x        any       7.0.1\n      Fusion         6.x        any       6.0.5\n\n   c. VMware ESXi, Workstation, and Player Denial of Service \n      vulnerability\n\n      VMware ESXi, Workstation, and Player contain an input\n      validation issue in VMware Authorization process (vmware-authd). \n      This issue may allow for a Denial of Service of the host. On \n      VMware ESXi and on Workstation running on Linux the Denial of\n      Service would be partial. \n\n      VMware would like to thank Dmitry Yudin @ret5et for reporting\n      this issue to us through HP's Zero Day Initiative. \n\n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n      has assigned the identifier CVE-2015-1044 to this issue. \n\n      Column 4 of the following table lists the action required to\n      remediate the vulnerability in each release, if a solution is \n      available. \n\n      VMware         Product    Running   Replace with/\n      Product        Version    on        Apply Patch\n      =============  =======    =======   =================\n      Workstation    11.x       any       not affected\n      Workstation    10.x       any       10.0.5\n\n      Player         7.x        any       not affected\n      Player         6.x        any       6.0.5\n\n      Fusion         7.x        any       not affected\n      Fusion         6.x        any       not affected\n\n      ESXi           5.5        ESXi      ESXi550-201501101-SG\n      ESXi           5.1        ESXi      ESXi510-201410101-SG\n      ESXi           5.0        ESXi      not affected\n\n   d. \n\n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n      has assigned the names CVE-2014-3513, CVE-2014-3567, \n      CVE-2014-3566 (\"POODLE\") and CVE-2014-3568 to these issues. \n\n      Column 4 of the following table lists the action required to\n      remediate the vulnerability in each release, if a solution is\n      available. \n\n      VMware         Product    Running   Replace with/\n      Product        Version    on        Apply Patch\n      =============  =======    =======   =================\n      vCenter Server 5.5        any       Update 2d*\n      vCenter Server 5.1        any       patch pending\n      vCenter Server 5.0        any       patch pending\n\n      ESXi           5.5        ESXi      ESXi550-201501101-SG       \n      ESXi           5.1        ESXi      patch pending\n      ESXi           5.0        ESXi      patch pending\n\n      * The VMware vCenter 5.5 SSO component will be \n        updated in a later release\n  \n   e. Update to ESXi libxml2 package\n\n      The libxml2 library is updated to version libxml2-2.7.6-17\n      to resolve a security issue. \n\n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n      has assigned the name CVE-2014-3660 to this issue. \n\n      Column 4 of the following table lists the action required to\n      remediate the vulnerability in each release, if a solution is\n      available. \n\n      VMware         Product    Running   Replace with/\n      Product        Version    on        Apply Patch\n      =============  =======    =======   =================\n      ESXi           5.5        ESXi      ESXi550-201501101-SG     \n      ESXi           5.1        ESXi      patch pending\n      ESXi           5.0        ESXi      patch pending\n     \n4. Solution\n\n   Please review the patch/release notes for your product and \n   version and verify the checksum of your downloaded file. \n\n   VMware Workstation 10.x\n   -------------------------------- \n   https://www.vmware.com/go/downloadworkstation \n\n   VMware Player 6.x\n   --------------------------------     \n   https://www.vmware.com/go/downloadplayer \n\n   VMware Fusion 7.x and 6.x\n   --------------------------------     \n   https://www.vmware.com/go/downloadplayer \n\n   vCenter Server\n   ----------------------------\n   Downloads and Documentation: \n   https://www.vmware.com/go/download-vsphere \n\n   ESXi 5.5 Update 2d\n   ----------------------------\n   File: update-from-esxi5.5-5.5_update01.zip\n   md5sum: 5773844efc7d8e43135de46801d6ea25\n   sha1sum: 6518355d260e81b562c66c5016781db9f077161f\n   http://kb.vmware.com/kb/2065832\n   update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG\n\n   ESXi 5.5\n   ----------------------------\n   File: ESXi550-201501001.zip\n   md5sum: b0f2edd9ad17d0bae5a11782aaef9304\n   sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1\n   http://kb.vmware.com/kb/2099265\n   ESXi550-201501001.zip contains ESXi550-201501101-SG\n\n   ESXi 5.1\n   ----------------------------\n   File: ESXi510-201404001.zip\n   md5sum: 9dc3c9538de4451244a2b62d247e52c4\n   sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66\n   http://kb.vmware.com/kb/2070666\n   ESXi510-201404001 contains ESXi510-201404101-SG\n\n   ESXi 5.0\n   ----------------------------\n   File: ESXi500-201405001.zip\n   md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d\n   sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5\n   http://kb.vmware.com/kb/2075521\n   ESXi500-201405001 contains  ESXi500-201405101-SG\n   \n5. Change log\n\n   2015-01-27 VMSA-2015-0001\n   Initial security advisory in conjunction with the release of VMware\n   Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d\n   and, ESXi 5.5 Patches released on 2015-01-27. Contact\n\n   E-mail list for product security notifications and announcements:\n   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n   This Security Advisory is posted to the following lists:\n\n    security-announce at lists.vmware.com\n    bugtraq at securityfocus.com\n    fulldisclosure at seclists.org\n\n   E-mail: security at vmware.com\n   PGP key at: http://kb.vmware.com/kb/1055\n\n   VMware Security Advisories\n   http://www.vmware.com/security/advisories\n\n   Consolidated list of VMware Security Advisories\n   http://kb.vmware.com/kb/2078735\n\n   VMware Security Response Policy\n   https://www.vmware.com/support/policies/security_response.html\n\n   VMware Lifecycle Support Phases\n   https://www.vmware.com/support/policies/lifecycle.html\n \n   Twitter\n   https://twitter.com/VMwareSRC\n\n   Copyright 2015 VMware Inc.  All rights reserved",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "131254",
         },
         {
            db: "PACKETSTORM",
            id: "128706",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "133617",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "128704",
         },
         {
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            db: "PACKETSTORM",
            id: "169664",
         },
         {
            db: "PACKETSTORM",
            id: "130144",
         },
      ],
      trust: 3.15,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3513",
            trust: 3.5,
         },
         {
            db: "SECUNIA",
            id: "61439",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61058",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61207",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61837",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "62070",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61298",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61990",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61073",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59627",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61959",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1031052",
            trust: 1.1,
         },
         {
            db: "BID",
            id: "70584",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10091",
            trust: 1.1,
         },
         {
            db: "JVN",
            id: "JVNVU99970459",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "70586",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3513",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169664",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131306",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128704",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131014",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132467",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130144",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137292",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128708",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132081",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "133617",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128808",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128706",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131254",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "PACKETSTORM",
            id: "169664",
         },
         {
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            db: "PACKETSTORM",
            id: "128704",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130144",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "133617",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128706",
         },
         {
            db: "PACKETSTORM",
            id: "131254",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   id: "VAR-201410-0371",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.3482142825,
   },
   last_update_date: "2024-11-29T20:53:44.405000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2015-09-16-2 Xcode 7.0",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html",
         },
         {
            title: "HT205217",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205217",
         },
         {
            title: "HT205217",
            trust: 0.8,
            url: "http://support.apple.com/ja-jp/HT205217",
         },
         {
            title: "HPSBHF03300",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2",
         },
         {
            title: "HPSBMU03223",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2",
         },
         {
            title: "HPSBMU03260",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
         },
         {
            title: "HPSBMU03261",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
         },
         {
            title: "HPSBMU03263",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
         },
         {
            title: "HPSBMU03267",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
         },
         {
            title: "HPSBMU03296",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2",
         },
         {
            title: "HPSBMU03304",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
         },
         {
            title: "HPSBGN03233",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2",
         },
         {
            title: "HPSBMU03611",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888",
         },
         {
            title: "HPSBMU03612",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380",
         },
         {
            title: "AIX OpenSSL Denial of Service due to memory leak in  DTLS SRTP extension",
            trust: 0.8,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc",
         },
         {
            title: "1686997",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            title: "Fix for SRTP Memory Leak",
            trust: 0.8,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d",
         },
         {
            title: "SRTP Memory Leak (CVE-2014-3513)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv_20141015.txt",
         },
         {
            title: "RHSA-2014:1652",
            trust: 0.8,
            url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html",
         },
         {
            title: "RHSA-2014:1692",
            trust: 0.8,
            url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html",
         },
         {
            title: "sol15722: OpenSSL DTLS SRTP Memory Leak CVE-2014-3513",
            trust: 0.8,
            url: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html",
         },
         {
            title: "Multiple vulnerabilities in OpenSSL",
            trust: 0.8,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2385-1",
         },
         {
            title: "Red Hat: CVE-2014-3513",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3513",
         },
         {
            title: "Debian Security Advisories: DSA-3053-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=89bdef3607a7448566a930eca0e94cb3",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-427",
         },
         {
            title: "Symantec Security Advisories: SA87 : OpenSSL Security Advisory 15-Oct-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=374cff59719675d8235f907c21b99bfc",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20141015' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-11",
         },
         {
            title: "IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSH",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b7f5b1e7edcafce07f28205855d4db49",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.9,
            url: "http://advisories.mageia.org/mgasa-2014-0416.html",
         },
         {
            trust: 1.6,
            url: "https://www.openssl.org/news/secadv_20141015.txt",
         },
         {
            trust: 1.4,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1652.html",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-2385-1",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-3053",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1692.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59627",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61298",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61959",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61439",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61073",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/70584",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/62070",
         },
         {
            trust: 1.1,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1031052",
         },
         {
            trust: 1.1,
            url: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-015.txt.asc",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61207",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61058",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61990",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61837",
         },
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/ht205217",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10091",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=2b0532f3984324ebe1236a63d15893792384328d",
         },
         {
            trust: 1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu99970459/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3513",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.5,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21687676",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "https://bto.bluecoat.com/security-advisory/sa87",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690537",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959161",
         },
         {
            trust: 0.3,
            url: "http://www.splunk.com/view/sp-caaanst",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691210",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/158",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/156",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/157",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/159",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/feb/151",
         },
         {
            trust: 0.3,
            url: "http://support.citrix.com/article/ctx216642",
         },
         {
            trust: 0.3,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:23.openssl.asc",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04492722",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692",
         },
         {
            trust: 0.3,
            url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04616259",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/apr/35",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533567 ",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04533567 ",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686792",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
         },
         {
            trust: 0.3,
            url: "https://support.asperasoft.com/entries/103000206-security-advisory-cve-2014-3513-cve-2014-3566-poodle-cve-2014-3567-cve-2014-3568",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097074",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21884030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959134",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691005",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21688284",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697995",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697165",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687801",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21689482",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097375",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689101",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700275",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098265",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021548",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097587",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701452",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098251",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098105",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21693662",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689347",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097159",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097913",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21697162",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097867",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097911",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097807",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098586",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689743",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020593",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21691140",
         },
         {
            trust: 0.3,
            url: "http://www.vmware.com/security/advisories/vmsa-2015-0001.html ",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101009000",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700489",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687863",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=ssg1s1005003",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.2,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/20.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2385-1/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/~bodo/ssl-poodle.pdf",
         },
         {
            trust: 0.1,
            url: "https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/go/oa",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04486577-1",
         },
         {
            trust: 0.1,
            url: "https://technet.microsoft.com/library/security/3009008",
         },
         {
            trust: 0.1,
            url: "https://twitter.com/vmwaresrc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1044",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2078735",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2070666",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/security/advisories",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8370",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2075521",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2065832",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1055",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/go/downloadplayer",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1043",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/lifecycle.html",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/go/downloadworkstation",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3660",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2099265",
         },
         {
            trust: 0.1,
            url: "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/security_response.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/go/download-vsphere",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7995",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2007-6750",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3237",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2015",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0728",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7547",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2011-4969",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightcontrol",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.22",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0248",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5910",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3185",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht201222",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://developer.apple.com/xcode/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-6394",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0251",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5909",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:23.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567>",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3513.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3567.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/1232123",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-2557aa7dc1654cf6b547c1a9e4",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-bd2042a1c7574aad90c4839efe",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-57ab6bb78b6e47a18718f44133",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-00eb9ac82e86449e8c3ba101bd",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-34bcab41ac7e4db299e3f5f2f1",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-062078f1ae354b7e99c86c151c",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-5827037475e44abab586463723",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-7b23e47d5d9b420b94bd1323eb",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "PACKETSTORM",
            id: "169664",
         },
         {
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            db: "PACKETSTORM",
            id: "128704",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130144",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "133617",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128706",
         },
         {
            db: "PACKETSTORM",
            id: "131254",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            db: "PACKETSTORM",
            id: "169664",
         },
         {
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            db: "PACKETSTORM",
            id: "128704",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130144",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "133617",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128706",
         },
         {
            db: "PACKETSTORM",
            id: "131254",
         },
         {
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-10-19T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            date: "2014-10-15T00:00:00",
            db: "BID",
            id: "70586",
         },
         {
            date: "2014-10-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            date: "2014-10-15T12:12:12",
            db: "PACKETSTORM",
            id: "169664",
         },
         {
            date: "2015-04-06T19:11:05",
            db: "PACKETSTORM",
            id: "131306",
         },
         {
            date: "2014-10-17T00:03:05",
            db: "PACKETSTORM",
            id: "128704",
         },
         {
            date: "2015-03-25T00:42:25",
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            date: "2015-06-29T15:35:42",
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            date: "2015-01-28T18:22:00",
            db: "PACKETSTORM",
            id: "130144",
         },
         {
            date: "2016-06-02T19:12:12",
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            date: "2014-10-17T00:03:35",
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            date: "2015-05-29T23:37:11",
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            date: "2015-09-19T15:31:48",
            db: "PACKETSTORM",
            id: "133617",
         },
         {
            date: "2014-10-22T19:54:29",
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            date: "2014-10-17T00:03:21",
            db: "PACKETSTORM",
            id: "128706",
         },
         {
            date: "2015-04-02T00:37:56",
            db: "PACKETSTORM",
            id: "131254",
         },
         {
            date: "2014-10-19T01:55:13.887000",
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3513",
         },
         {
            date: "2016-09-09T15:00:00",
            db: "BID",
            id: "70586",
         },
         {
            date: "2016-10-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
         {
            date: "2024-11-21T02:08:16.653000",
            db: "NVD",
            id: "CVE-2014-3513",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "70586",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  DTLS SRTP Extension  d1_srtp.c Service disruption in  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-004939",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "70586",
         },
      ],
      trust: 0.3,
   },
}

var-201312-0173
Vulnerability from variot

IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not properly restrict use of FRAME elements, which allows remote authenticated users to bypass intended access restrictions or obtain sensitive information via a crafted web site, related to a "frame injection" issue. IBM Sterling B2B Integrator and IBM Sterling File Gateway are prone to an unspecified frame-injection vulnerability. An attacker can exploit this issue to conduct phishing attacks. Successful exploits will allow the attacker to gain unauthorized access or obtain sensitive information. The following product versions are vulnerable: IBM Sterling B2B Integrator 5.2 IBM Sterling File Gateway 2.2. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. The vulnerability stems from the fact that the program does not properly restrict the use of FRAME elements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0173",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64449",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5407",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.8,
                  id: "CVE-2013-5407",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.8,
                  id: "VHN-65409",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:P/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5407",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5407",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-445",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65409",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not properly restrict use of FRAME elements, which allows remote authenticated users to bypass intended access restrictions or obtain sensitive information via a crafted web site, related to a \"frame injection\" issue. IBM Sterling B2B Integrator and IBM Sterling File Gateway are prone to an unspecified frame-injection vulnerability. \nAn attacker can exploit this issue to conduct phishing attacks. Successful exploits will allow the attacker to gain unauthorized access or obtain sensitive information. \nThe following product versions are vulnerable:\nIBM Sterling B2B Integrator 5.2\nIBM Sterling File Gateway 2.2. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. The vulnerability stems from the fact that the program does not properly restrict the use of FRAME elements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "BID",
            id: "64449",
         },
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5407",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "20135407",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "87356",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC96057",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "64449",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-65409",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            db: "BID",
            id: "64449",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   id: "VAR-201312-0173",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T21:55:29.872000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC96057",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96057",
         },
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96057",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87356",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5407",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5407",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87356",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            db: "BID",
            id: "64449",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64449",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            date: "2013-12-21T14:22:56.927000",
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65409",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64449",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
         {
            date: "2024-11-21T01:57:25.763000",
            db: "NVD",
            id: "CVE-2013-5407",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to access restrictions",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005685",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-445",
         },
      ],
      trust: 0.6,
   },
}

var-201506-0498
Vulnerability from variot

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. The following are vulnerable: OpenSSL 1.0.2 prior to 1.0.2b OpenSSL 1.0.1 prior to 1.0.1n OpenSSL 1.0.0 prior to 1.0.0s OpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015] =======================================

DHE man-in-the-middle protection (Logjam)

A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).

OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.

Malformed ECParameters causes infinite loop (CVE-2015-1788)

Severity: Moderate

When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field.

This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.

This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.

Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

Severity: Moderate

X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.

An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.

PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)

Severity: Moderate

The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.

Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.

This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The fix was developed by Matt Caswell of the OpenSSL development team. It existed in previous OpenSSL versions and was fixed in June 2014.

If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.

This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.

The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

.

Release Date: 2015-08-05 Last Updated: 2015-08-05

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled.

References:

CVE-2015-4000: DHE man-in-the-middle protection (Logjam).

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided an updated version of OpenSSL to resolve this vulnerability.

A new B.11.31 depot for OpenSSL_A.01.00.01p is available here:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I

MANUAL ACTIONS: Yes - Update

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.01.00.01p or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 5 August 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-02


                                       https://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: June 22, 2015 Bugs: #551832 ID: 201506-02


Synopsis

Multiple vulnerabilities have been found in OpenSSL that can result in either Denial of Service or information disclosure.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o

Description

Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7"

References

[ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201506-02

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. ============================================================================ Ubuntu Security Notice USN-2639-1 June 11, 2015

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in OpenSSL. (CVE-2014-8176)

Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. (CVE-2015-1792)

As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04: libssl1.0.0 1.0.1f-1ubuntu11.4

Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.8

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.15

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.31

After a standard system update you need to reboot your computer to make all the necessary changes. Corrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE) 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12) 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE) 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16) 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE) 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30) CVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 CVE-2015-1792, CVE-2015-4000

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2015-1791]

The OpenSSL advisory also describes a problem that is identified as CVE-2014-8176, which is already fixed by an earlier FreeBSD Errata Notice, FreeBSD-EN-15:02.openssl.

III. [CVE-2015-4000]. [CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem was no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]

An attacker may be able to crash multi-thread applications that supports resumed TLS handshakes. [CVE-2015-1791]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.1]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc

gpg --verify openssl-10.1.patch.asc

[FreeBSD 9.3 and 8.4]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r284286 releng/8.4/ r284295 stable/9/ r284286 releng/9.3/ r284295 stable/10/ r284285 releng/10.1/ r284295


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1115-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1115.html Issue date: 2015-06-15 CVE Names: CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176)

A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. (CVE-2015-3216)

An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789)

A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791)

A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792)

A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790)

Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Käsper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792.

All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent 1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function 1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket 1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm

ppc64: openssl-1.0.1e-30.el6_6.11.ppc.rpm openssl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm

s390x: openssl-1.0.1e-30.el6_6.11.s390.rpm openssl-1.0.1e-30.el6_6.11.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-devel-1.0.1e-30.el6_6.11.s390.rpm openssl-devel-1.0.1e-30.el6_6.11.s390x.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-static-1.0.1e-30.el6_6.11.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-perl-1.0.1e-30.el6_6.11.s390x.rpm openssl-static-1.0.1e-30.el6_6.11.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-30.el6_6.11.src.rpm

i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

ppc64: openssl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm

s390x: openssl-1.0.1e-42.el7_1.8.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-devel-1.0.1e-42.el7_1.8.s390.rpm openssl-devel-1.0.1e-42.el7_1.8.s390x.rpm openssl-libs-1.0.1e-42.el7_1.8.s390.rpm openssl-libs-1.0.1e-42.el7_1.8.s390x.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.ael7b_1.8.src.rpm

ppc64le: openssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-static-1.0.1e-42.el7_1.8.ppc.rpm openssl-static-1.0.1e-42.el7_1.8.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-perl-1.0.1e-42.el7_1.8.s390x.rpm openssl-static-1.0.1e-42.el7_1.8.s390.rpm openssl-static-1.0.1e-42.el7_1.8.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-42.el7_1.8.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2014-8176 https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-1791 https://access.redhat.com/security/cve/CVE-2015-1792 https://access.redhat.com/security/cve/CVE-2015-3216 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk ZyXizCcFL9oAQexObjxp/Mo= =PXiY -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0498",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "15.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.3",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0r",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zf",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "sparc-opl service processor",
            scope: "lte",
            trust: 1,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "hs series all versions",
         },
         {
            model: "hpe systems insight manager",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "6.1",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.54",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver6.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v7.1 to  v8.1",
         },
         {
            model: "hpe matrix operating environment",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0s",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "7.0",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v4.2 to  v6.5",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "mcoperations ver3.6.2 to  ver4.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ip38x/5000",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "all revisions",
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0 manager component",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.01",
         },
         {
            model: "mysql",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "5.6.25 and earlier",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.10 to  10.10.4",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.1",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c ucm",
         },
         {
            model: "e-business suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "hpe insight control",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "none",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  sg3600lm/lg/lj v6.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "systemmanager ver5.5.2 to  ver6.2.1",
         },
         {
            model: "ip38x/3500",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "all revisions",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard v8.2 to  v9.2",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7500/nv5500/nv3500 series",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7400/nv5400/nv3400 series",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v4.0",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v7.1 to  v8.1",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle exalogic infrastructure eecs 2.0.6.2.3",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "uddi registry v1.1 to  v7.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator probe option ver3.1.0.x to  ver4.1.0.x",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.0",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.02",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c cmm",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.2",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v4.2 to  v6.5",
         },
         {
            model: "hpe server migration pack",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1",
         },
         {
            model: "xcp",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "(sparc enterprise m3000/m4000/m5000/m8000/m9000 server )",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v7.1",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.53",
         },
         {
            model: "hpe version control repository manager",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  intersecvm/sg v1.2",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.0",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "jobcenter r14.1",
         },
         {
            model: "ip38x/810",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "all revisions",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v4.1 to  v6.5",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "hpe insight control",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "server provisioning",
         },
         {
            model: "xcp",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.9.5",
         },
         {
            model: "webotx sip application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1 to  v8.1",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.8.5",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator agent ver3.3 to  ver4.1",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.1",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v4.1 to  v6.5",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.4 to  v9.2",
         },
         {
            model: "ip38x/1210",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "all revisions",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator manager ver3.2.2 to  ver4.1",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "8.0",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  univerge sg3000lg/lj",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "sparc-opl service processor",
            scope: "eq",
            trust: 0.6,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "imc products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37001.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.15",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50001.1",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0.0.52",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.2",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.10.38",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.20",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 15.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.12",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.0",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.0",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "meeting exchange sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "exalogic infrastructure eecs",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.2",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.34",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.25",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "70",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.3",
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "flashsystem 9840-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "ds8870 r7.5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.12.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.5",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.18",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "fortivoice enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.6",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.7",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.19",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.1",
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "junos 12.1x46-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4.0.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.12",
         },
         {
            model: "project openssl 1.0.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "junos 12.1x47-d45",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.2",
         },
         {
            model: "screenos 6.3.0r13",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "fortiddos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.1.5",
         },
         {
            model: "linux enterprise server sp4 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "secure backup",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.13",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "qradar incident forensics mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.6",
         },
         {
            model: "aura application server sip core pb5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.18",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35001.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "flashsystem 9846-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "fsso build",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "235",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.3",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.5",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.2",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12.01",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.6",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.214",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.5",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3.0.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.2",
         },
         {
            model: "hp-ux b.11.22",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 14.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.12",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.6",
         },
         {
            model: "open source siem",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "junos 13.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "cms r16.3",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.19",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "workflow for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "junos 14.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.8",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.33",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.5",
         },
         {
            model: "enterprise content management system monitor fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.02",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.03",
         },
         {
            model: "i v5r4",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "junos 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.1.8",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "junos 14.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "one-x client enablement services sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "screenos 6.3.0r19",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.7",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.8",
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.213",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.6",
         },
         {
            model: "hp-ux b.11.11.16.09",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.4",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.38",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "aura utility services sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.12",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "flashsystem 9848-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "15.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "flashsystem 9846-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.6",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "linux x86 64 -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.3",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.35",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "project openssl 0.9.8zg",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 13.2x51-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "qradar siem mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.5",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "hp-ux b.11.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.3",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.7",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.10",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.1",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.5",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "project openssl 1.0.0r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "aura conferencing sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "workload deployer if9",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "cognos insight standard edition fp if",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.124",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.0",
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "hp-ux b.11.11.14.15",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.20.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.3",
         },
         {
            model: "fortiadc",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.21",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1",
         },
         {
            model: "unified security management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.15",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.22",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "hp-ux b.11.11.15.13",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.3",
         },
         {
            model: "qradar incident forensics patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.3",
         },
         {
            model: "security identity manager virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.14",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.3",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "hp-ux b.11.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "enterprise linux server eus 6.6.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "qradar incident forensics mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.0",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "meeting exchange sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 12.3x48-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.03",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.1",
         },
         {
            model: "rational policy tester",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.9",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.30",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "aura conferencing sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "security network controller 1.0.3387m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 15.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "50",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.38",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.14",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.8",
         },
         {
            model: "screenos 6.3.0r22",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.5",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.21",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0.14",
         },
         {
            model: "cognos insight standard edition fp if",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.214",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.16",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "junos 14.1r6",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.16",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.10",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "hp-ux b.11.23.1.007",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "forticlient windows/mac",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.31",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.04",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.6",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security identity governance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.12",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.0.0",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "hp-ux b.11.11.02.008",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.19",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "junos 14.2r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "powerkvm build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.157",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.1",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.8",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.24",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vcx products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "qradar incident forensics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "aura application server sip core pb3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.10",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "flashsystem 9843-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.12.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.5",
         },
         {
            model: "hp-ux b.11.11.17.02",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.01",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "forticlient ios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.41",
         },
         {
            model: "forticlient android",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.6",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "sonas",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.41",
         },
         {
            model: "hp-ux b.11.23.07.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "aura conferencing sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.7",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.2",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "junos 12.1x46-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "rational developer for aix and linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1",
         },
         {
            model: "junos 15.1x49-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.3",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.12",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.10",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "flashsystem 9848-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.13",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.62",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.2",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.5",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "junos 12.3x48-d30",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.6",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.8",
         },
         {
            model: "aura conferencing sp6",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.05",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.7",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "junos 15.1x49-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura messaging sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "15.04",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.13",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "ascenlink",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "7.2.3",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.9",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "junos 13.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communications security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flashsystem 9848-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "qradar siem patch ifix01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.44",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.00",
         },
         {
            model: "filenet system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.8",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "screenos 6.3.0r21",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.19",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "aura communication manager ssp04",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.1.8",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise content management system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling connect:enterprise for unix ifix03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "junos 12.1x44-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.50",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.8",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "qradar siem mr2 patch ifi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.110",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "hp-ux b.11.11.13.14",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.15",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.1.7",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3",
         },
         {
            model: "rational developer for aix and linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.34",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "screenos 6.3.0r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.2.0",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.12",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.45",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "junos 14.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "flashsystem 9846-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.11",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.16",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.0",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.21.0",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "qradar siem mr1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.37",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "junos 12.1x44-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.19",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.1.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.5",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11.15",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.6",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.02",
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.23",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "junos 12.3r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "linux enterprise server sp1 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "screenos 6.3.0r20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "junos 13.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cognos insight standard edition fp",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.24",
         },
         {
            model: "forticache",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "aura application server sip core sp10",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "junos 14.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.16",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.33",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.37",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.43",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.12",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "junos 14.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.32",
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.8",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.8",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.19",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "75156",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:mysql",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:e-business_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:fusion_middleware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:peoplesoft_products",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:supply_chain_products_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:xcp",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:insight_control",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:matrix_operating_environment",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:server_migration_pack",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:systems_insight_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:version_control_repository_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:system_management_homepage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:capssuite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterprise_directoryserver",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_1200",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_1210",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_3500",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_5000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_810",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ip38x_fw120",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:istorage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:univerge",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_sip_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:websam",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Robert Swiecki(Google) and Hanno B&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;ouml;ck.",
      sources: [
         {
            db: "BID",
            id: "75156",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-1789",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2015-1789",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2015-1789",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-1789",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-1789",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201506-245",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-1789",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. \nThe following are vulnerable:\nOpenSSL 1.0.2 prior to 1.0.2b\nOpenSSL 1.0.1 prior to 1.0.1n\nOpenSSL 1.0.0 prior to 1.0.0s\nOpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nMalformed ECParameters causes infinite loop (CVE-2015-1788)\n===========================================================\n\nSeverity: Moderate\n\nWhen processing an ECParameters structure OpenSSL enters an infinite loop if\nthe curve specified is over a specially malformed binary polynomial field. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates.  This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno Böck. The fix\nwas developed by Emilia Käsper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by  Michal\nZalewski (Google). The fix was developed by Emilia Käsper of the\nOpenSSL development team. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The\nfix was developed by Matt Caswell of the OpenSSL development team. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. \n\nRelease Date: 2015-08-05\nLast Updated: 2015-08-05\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running\nOpenSSL with SSL/TLS enabled. \n\nReferences:\n\nCVE-2015-4000: DHE man-in-the-middle protection (Logjam). \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-4000    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2015-1788    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1789    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1790    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1791    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2015-1792    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1793    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided an updated version of OpenSSL to resolve this vulnerability. \n\nA new B.11.31 depot for OpenSSL_A.01.00.01p is available here:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.01.00.01p or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 5 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201506-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: June 22, 2015\n     Bugs: #551832\n       ID: 201506-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL that can result in\neither Denial of Service or information disclosure. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1o               >= 0.9.8z_p7\n                                                            >= 1.0.1o\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1o\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-8176\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176\n[ 2 ] CVE-2015-1788\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788\n[ 3 ] CVE-2015-1789\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789\n[ 4 ] CVE-2015-1790\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790\n[ 5 ] CVE-2015-1791\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791\n[ 6 ] CVE-2015-1792\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792\n[ 7 ] CVE-2015-4000\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201506-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. ============================================================================\nUbuntu Security Notice USN-2639-1\nJune 11, 2015\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. (CVE-2014-8176)\n\nJoseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed\nECParameters structures. \n(CVE-2015-1792)\n\nAs a security improvement, this update also modifies OpenSSL behaviour to\nreject DH key sizes below 768 bits, preventing a possible downgrade\nattack. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n  libssl1.0.0                     1.0.1f-1ubuntu11.4\n\nUbuntu 14.10:\n  libssl1.0.0                     1.0.1f-1ubuntu9.8\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.15\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.31\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \nCorrected:      2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE)\n                2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12)\n                2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE)\n                2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16)\n                2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE)\n                2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30)\nCVE Name:       CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791\n                CVE-2015-1792, CVE-2015-4000\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:https://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2015-1791]\n\nThe OpenSSL advisory also describes a problem that is identified as\nCVE-2014-8176, which is already fixed by an earlier FreeBSD Errata\nNotice, FreeBSD-EN-15:02.openssl. \n\nIII. [CVE-2015-4000]. \n[CVE-2015-1788].  This affects FreeBSD 10.1 only, as the problem\nwas no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]\n\nAn attacker may be able to crash multi-thread applications that\nsupports resumed TLS handshakes. [CVE-2015-1791]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc\n# gpg --verify openssl-10.1.patch.asc\n\n[FreeBSD 9.3 and 8.4]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r284286\nreleng/8.4/                                                       r284295\nstable/9/                                                         r284286\nreleng/9.3/                                                       r284295\nstable/10/                                                        r284285\nreleng/10.1/                                                      r284295\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security update\nAdvisory ID:       RHSA-2015:1115-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2015-1115.html\nIssue date:        2015-06-15\nCVE Names:         CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 \n                   CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nAn invalid free flaw was found in the way OpenSSL handled certain DTLS\nhandshake messages. A malicious DTLS client or server could cause a DTLS\nserver or client using OpenSSL to crash or, potentially, execute arbitrary\ncode. (CVE-2014-8176)\n\nA flaw was found in the way the OpenSSL packages shipped with Red Hat\nEnterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes()\nfunction. (CVE-2015-3216)\n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. (CVE-2015-1789)\n\nA race condition was found in the session handling code of OpenSSL. This\nissue could possibly cause a multi-threaded TLS/SSL client using OpenSSL\nto double free session ticket data and crash. (CVE-2015-1791)\n\nA flaw was found in the way OpenSSL handled Cryptographic Message Syntax\n(CMS) messages. A CMS message with an unknown hash function identifier\ncould cause an application using OpenSSL to enter an infinite loop. \n(CVE-2015-1792)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash. \n(CVE-2015-1790)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and\nCVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan\nFratric as the original reporters of CVE-2014-8176, Robert Swiecki and\nHanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as\nthe original reporter of CVE-2015-1790, Emilia Käsper as the original\nreport of  CVE-2015-1791 and Johannes Bauer as the original reporter of\nCVE-2015-1792. \n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression\n1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time\n1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent\n1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function\n1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket\n1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nppc64:\nopenssl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.ael7b_1.8.src.rpm\n\nppc64le:\nopenssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64le:\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-8176\nhttps://access.redhat.com/security/cve/CVE-2015-1789\nhttps://access.redhat.com/security/cve/CVE-2015-1790\nhttps://access.redhat.com/security/cve/CVE-2015-1791\nhttps://access.redhat.com/security/cve/CVE-2015-1792\nhttps://access.redhat.com/security/cve/CVE-2015-3216\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20150611.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk\nZyXizCcFL9oAQexObjxp/Mo=\n=PXiY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "BID",
            id: "75156",
         },
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-1789",
            trust: 3.5,
         },
         {
            db: "JUNIPER",
            id: "JSA10733",
            trust: 2,
         },
         {
            db: "JUNIPER",
            id: "JSA10694",
            trust: 2,
         },
         {
            db: "BID",
            id: "75156",
            trust: 2,
         },
         {
            db: "BID",
            id: "91787",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "MCAFEE",
            id: "SB10122",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1032564",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91445763",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-1789",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169629",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132973",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132260",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132288",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132313",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "BID",
            id: "75156",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   id: "VAR-201506-0498",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.27443620166666666,
   },
   last_update_date: "2024-11-29T21:23:34.633000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205031",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/HT205031",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl",
         },
         {
            title: "Fix length checks in X509_cmp_time to avoid out-of-bounds reads.",
            trust: 0.8,
            url: "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11",
         },
         {
            title: "HPSBUX03388",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&amp;m=143880121627664&amp;w=2",
         },
         {
            title: "HPSBMU03612",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380",
         },
         {
            title: "HPSBHF03613",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05184351",
         },
         {
            title: "HPSBMU03546",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05045763",
         },
         {
            title: "HPSBMU03611",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888",
         },
         {
            title: "アライドテレシス株式会社からの情報",
            trust: 0.8,
            url: "http://jvn.jp/vu/JVNVU91445763/522154/index.html",
         },
         {
            title: "NV15-010",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv15-010.html",
         },
         {
            title: "OpenSSL vulnerabilities",
            trust: 0.8,
            url: "https://www.openssl.org/news/vulnerabilities.html",
         },
         {
            title: "Tarballs",
            trust: 0.8,
            url: "https://www.openssl.org/source/",
         },
         {
            title: "[11 Jun 2015] DHE man-in-the-middle protection (Logjam)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - April 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015verbose-2367954.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - April 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
         },
         {
            title: "Oracle Critical Patch Update CVSS V2 Risk Matrices - April 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html",
         },
         {
            title: "Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            title: "April 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/april_2016_critical_patch_update",
         },
         {
            title: "October 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2015_critical_patch_update",
         },
         {
            title: "July 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/july_2016_critical_patch_update",
         },
         {
            title: "January 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2016_critical_patch_update",
         },
         {
            title: "JSA10694",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
         },
         {
            title: "TLSA-2015-14",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2015/TLSA-2015-14j.html",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1129/1129443_cisco-sa-20150612-openssl-j.html",
         },
         {
            title: "openssl-1.0.1n",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56612",
         },
         {
            title: "openssl-1.0.0s",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56611",
         },
         {
            title: "openssl-0.9.8zg",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56610",
         },
         {
            title: "openssl-1.0.2b",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56613",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/",
         },
         {
            title: "Red Hat: CVE-2015-1789",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1789",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2639-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-550",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-550",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20150611' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-07",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150612-openssl",
         },
         {
            title: "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2015-1789 ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/khadas/android_external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/yaap/external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/crdroid-r/external_honggfuzz ",
         },
         {
            title: "tab_pie_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/CredenceID/tab_pie_external_honggfuzz ",
         },
         {
            title: "platform_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/DennissimOS/platform_external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/swordphoenix/external_honggfuzz ",
         },
         {
            title: "platform_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/aosp-caf-upstream/platform_external_honggfuzz ",
         },
         {
            title: "honggfuzz_READ",
            trust: 0.1,
            url: "https://github.com/imbaya2466/honggfuzz_READ ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/bananadroid/android_external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/ForkLineageOS/external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/TheXPerienceProject/android_external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/random-aosp-stuff/android_external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/Wave-Project/external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/Project-1CE/external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/jingpad-bsp/android_external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/crdroidandroid/android_external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/StatiXOS/android_external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/CAF-Extended/external_honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/Ozone-OS/external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/Corvus-R/android_external_honggfuzz ",
         },
         {
            title: "external-honggfuzz",
            trust: 0.1,
            url: "https://github.com/TinkerBoard2-Android/external-honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/TinkerEdgeR-Android/external_honggfuzz ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/ep-infosec/50_google_honggfuzz ",
         },
         {
            title: "lllnx",
            trust: 0.1,
            url: "https://github.com/lllnx/lllnx ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/TinkerBoard2-Android/external_honggfuzz ",
         },
         {
            title: "external-honggfuzz",
            trust: 0.1,
            url: "https://github.com/TinkerBoard-Android/external-honggfuzz ",
         },
         {
            title: "external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/HavocR/external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/ProtonAOSP-platina/android_external_honggfuzz ",
         },
         {
            title: "android_external_honggfuzz",
            trust: 0.1,
            url: "https://github.com/ProtonAOSP/android_external_honggfuzz ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Tomoms/android_external_honggfuzz ",
         },
         {
            title: "honggfuzz",
            trust: 0.1,
            url: "https://github.com/google/honggfuzz ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            trust: 2.1,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1115.html",
         },
         {
            trust: 2,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10694",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 2,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl",
         },
         {
            trust: 2,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.8,
            url: "http://www.securityfocus.com/bid/75156",
         },
         {
            trust: 1.8,
            url: "https://security.gentoo.org/glsa/201506-02",
         },
         {
            trust: 1.8,
            url: "http://www.ubuntu.com/usn/usn-2639-1",
         },
         {
            trust: 1.7,
            url: "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11",
         },
         {
            trust: 1.7,
            url: "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/kb/ht205031",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05157667",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/91787",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            trust: 1.7,
            url: "https://openssl.org/news/secadv/20150611.txt",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733",
         },
         {
            trust: 1.7,
            url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa98",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05353965",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.7,
            url: "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc",
         },
         {
            trust: 1.7,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10122",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160647.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160436.html",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1032564",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2015/dsa-3287",
         },
         {
            trust: 1.7,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1197.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu91445763/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1789",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.7,
            url: "https://access.redhat.com/security/cve/cve-2015-1789",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/errata/rhsa-2015:1115",
         },
         {
            trust: 0.6,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228603",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/errata/rhsa-2015:1197",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962775",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965845",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/13",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04739301",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05353965",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/135",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05157667",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1022724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005313",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005376",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21961837",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962520",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963232",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963954",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965415",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21966484",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966723",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098801",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012435",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101013879",
         },
         {
            trust: 0.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-15-014/",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012550",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/5438/security-advisory-alienvault-v5-0-4-addresses-31-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962726",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963964",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005375",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962039",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022647",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961800",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963096",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960713",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964033",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964441",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=swg21903425",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960157",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961179",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962493",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=0&uid=swg21963438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962623",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959518",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961569",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963270",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005314",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005373",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005434",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960045",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966481",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966847",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966873",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21967384",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968046",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968871",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970020",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21971238",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963603",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966381",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/119.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2639-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=44733",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3286",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.1,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1793",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20150611.txt>",
         },
         {
            trust: 0.1,
            url: "https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4000>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-15:10.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "https://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792>",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "BID",
            id: "75156",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            db: "BID",
            id: "75156",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-06-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            date: "2015-06-11T00:00:00",
            db: "BID",
            id: "75156",
         },
         {
            date: "2015-06-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            date: "2015-06-11T12:12:12",
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            date: "2015-08-06T10:10:00",
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            date: "2015-06-22T14:14:00",
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            date: "2015-06-11T23:39:03",
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            date: "2015-06-12T13:25:28",
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            date: "2015-06-15T23:37:59",
            db: "PACKETSTORM",
            id: "132313",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2015-06-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            date: "2015-06-12T19:59:02.507000",
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-02-13T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1789",
         },
         {
            date: "2017-05-02T01:08:00",
            db: "BID",
            id: "75156",
         },
         {
            date: "2017-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
         {
            date: "2023-04-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
         {
            date: "2024-11-21T02:26:08.423000",
            db: "NVD",
            id: "CVE-2015-1789",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  crypto/x509/x509_vfy.c of  X509_cmp_time Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003081",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-245",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0014
Vulnerability from variot

Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than CVE-2013-0560. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0014",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2012-5766",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2012-5766",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-59047",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2012-5766",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2012-5766",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201303-371",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-59047",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple SQL injection vulnerabilities in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to execute arbitrary SQL commands via vectors involving the RNVisibility page and unspecified screens, a different vulnerability than CVE-2013-0560. \nExploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2012-5766",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "58501",
            trust: 1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "80267",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC84082",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-59047",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   id: "VAR-201307-0014",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:21:30.338000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC84082",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84082",
         },
         {
            title: "1627982",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627982",
         },
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-89",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic84082",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627982",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/80267",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5766",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5766",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/80267",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/58501",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21627982",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            db: "BID",
            id: "58501",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58501",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            date: "2013-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            date: "2013-07-03T13:54:30.917000",
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-59047",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58501",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
         {
            date: "2017-08-29T01:32:45.247000",
            db: "NVD",
            id: "CVE-2012-5766",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway In  SQL Injection vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2012-006019",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "SQL injection",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201303-371",
         },
      ],
      trust: 0.6,
   },
}

var-201406-0445
Vulnerability from variot

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability. OpenSSL is vulnerable to a man-in-the-middle attack. Successfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks.

HP IceWall SSO Dfw and MCRP

If possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to use SSL/TLS for back-end web server connection.

HP IceWall SSO Dfw Certd

If possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS on any connection with LDAP server.

Note: The HP IceWall product is only available in Japan. Please note that version 7.3.3 of HP Insight Control server migration is included on the HP Insight Management 7.3 Update 2 DVD.

HP has provided the installation binaries for download from the following web site by using the Receive for free option:

http://h18013.www1.hp.com/products/servers/management/fpdownload.html

Customers using HP Insight Control server migration v7.2.2 must first upgrade from v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then upgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD.

Customers running HP Insight Control server migration v7.3, v7.3.1, or v7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to complete the upgrade.

For more information on the upgrade process, please refer to the HP Insight Management Installation and Upgrade Guide and Release notes, which are available at the following location:

http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind ex.aspx?cat=insightmanagement

NOTE: The upgrade paths described above update the entire HP Insight Control software stack. To upgrade HP Insight Control server migration only, complete the following steps:

Copy "hpsmp.exe" to the local machine from the HP Insight Management v7.3.0 Update 2 DVD ISO. Create batch file with the following commands: @echo off hpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch Copy the batch file to the folder where "hpsmp.exe" normally resides on the target system. Double click on the batch file. The HP Insight Control server migration installation starts in a command prompt. The command prompt closes when the installation finishes. After the installation completes it creates a log file (ICmigr.log) and an output file (ICmigroutput.xml) on the target system. Do not close or click on the command prompt while the process is completing. Do not run the command prompt in the background.

HISTORY Version:1 (rev.1) - 23 July 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. The updates are available from https://h20392.www2.hp.com/portal/swdepot/displayP roductInfo.do?productNumber=OPENSSL11I

HP-UX Release HP-UX OpenSSL version

B.11.11 (11i v1) A.00.09.08za.001_HP-UX_B.11.11_32+64.depot

B.11.23 (11i v2) A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install OpenSSL A.00.09.08za or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant. ============================================================================ Ubuntu Security Notice USN-2232-3 June 23, 2014

openssl regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 13.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

USN-2232-1 introduced a regression in OpenSSL. The upstream fix for CVE-2014-0224 caused a regression for certain applications that use renegotiation, such as PostgreSQL. This update fixes the problem.

Original advisory details:

J=C3=BCri Aedla discovered that OpenSSL incorrectly handled invalid DTLS fragments. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0195) Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2014-0221) KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain handshakes. (CVE-2014-0224) Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled anonymous ECDH ciphersuites. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-3470)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.4

Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.6

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.16

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.19

After a standard system update you need to reboot your computer to make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2232-3 http://www.ubuntu.com/usn/usn-2232-1 https://launchpad.net/bugs/1332643

Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4 https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16 https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04347622

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04347622 Version: 1

HPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network Products including H3C and 3COM Routers and Switches running OpenSSL, Remote Denial of Service (DoS), Code Execution, Unauthorized Access, Modification or Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-06-20 Last Updated: 2014-06-20

Potential Security Impact: Remote Denial of Service (DoS), code execution, unauthorized access, modification of information, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Intelligent Management Center (iMC), HP Network Products including 3COM and H3C routers and switches running OpenSSL. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS), execute code, allow unauthorized access, modify or disclose information.

References:

CVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information CVE-2014-0198 Remote Unauthorized Access (only iMC impacted) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information SSRT101561 Note: All products listed are impacted by CVE-2014-0224 . iMC is also impacted by CVE-2014-0198 and CVE-2010-5298

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION section below for a list of impacted products.

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION On June 5th 2014, OpenSSL.org issued an advisory with several CVE vulnerabilities. HP Networking is working to release fixes for these vulnerabilities that impact the products in the table below. As fixed software is made available, this security bulletin will be updated to show the fixed versions. Until the software fixes are available, HP Networking is providing the following information including possible workarounds to mitigate the risks of these vulnerabilities.

Description

The most serious issue reported is CVE-2014-0224 and it is the one discussed here. To take advantage CVE-2014-0224, an attacker must:

be in between the OpenSSL client and OpenSSL server. be capable of intercepting and modifying packets between the OpenSSL client and OpenSSL server in real time.

Workarounds

HP Networking equipment is typically deployed inside firewalls and access to management interfaces and other protocols is more tightly controlled than in public environments. This deployment and security restrictions help to reduce the possibility of an attacker being able to intercept both OpenSSL client and OpenSSL server traffic.

Following the guidelines in the Hardening Comware-based devices can help to further reduce man-in-the-middle opportunities:

http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536 920

For an HP Networking device acting as an OpenSSL Server, using a patched OpenSSL client or non-OpenSSL client eliminates the risk. As an example, most modern web browsers do not use the OpenSSL client and the sessions between the HP Networking OpenSSL server and the non-OpenSSL client are not at risk for this attack. For HP Networking Equipment that is using an OpenSSL client, patching the OpenSSL server will eliminate the risk of this attack.

Protocol Notes

The following details the protocols that use OpenSSL in Comware v5 and Comware v7:

Comware V7:

Server:

FIPS/HTTPS/Load Balancing/Session Initiation Protocol

Client:

Load Balancing/OpenFlow/Session Initiation Protocol/State Machine Based Anti-Spoofing/Dynamic DNS

Comware V5:

Server:

CAPWAP/EAP/SSLVPN

Client:

Dynamic DNS

Family Fixed Version HP Branded Products Impacted H3C Branded Products Impacted 3Com Branded Products Impacted

12900 Switch Series Fix in progress use mitigations JG619A HP FF 12910 Switch AC Chassis JG621A HP FF 12910 Main Processing Unit JG632A HP FF 12916 Switch AC Chassis JG634A HP FF 12916 Main Processing Unit

12500 Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JC808A HP 12500 TAA Main Processing Unit H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)

12500 (Comware v7) Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JG497A HP 12500 MPU w/Comware V7 OS JG782A HP FF 12508E AC Switch Chassis JG783A HP FF 12508E DC Switch Chassis JG784A HP FF 12518E AC Switch Chassis JG785A HP FF 12518E DC Switch Chassis JG802A HP FF 12500E MPU H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)

11900 Switch Series Fix in progress use mitigations JG608A HP FF 11908-V Switch Chassis JG609A HP FF 11900 Main Processing Unit

10500 Switch Series (Comware v5) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC614A HP 10500 Main Processing Unit JC748A HP 10512 Switch Chassis JG375A HP 10500 TAA Main Processing Unit JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis

10500 Switch Series (Comware v7) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC748A HP 10512 Switch Chassis JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis JG496A HP 10500 Type A MPU w/Comware v7 OS

9500E Fix in progress use mitigations JC124A HP A9508 Switch Chassis JC124B HP 9505 Switch Chassis JC125A HP A9512 Switch Chassis JC125B HP 9512 Switch Chassis JC474A HP A9508-V Switch Chassis JC474B HP 9508-V Switch Chassis H3C S9505E Routing-Switch Chassis (0235A0G6) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9512E Routing-Switch Chassis (0235A0G7) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9505E Chassis w/ Fans (0235A38P) H3C S9512E Chassis w/ Fans (0235A38R)

Router 8800 Fix in progress use mitigations JC147A HP A8802 Router Chassis JC147B HP 8802 Router Chassis JC148A HP A8805 Router Chassis JC148B HP 8805 Router Chassis JC149A HP A8808 Router Chassis JC149B HP 8808 Router Chassis JC150A HP A8812 Router Chassis JC150B HP 8812 Router Chassis JC141A HP 8802 Main Control Unit Module JC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod JC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod H3C SR8805 10G Core Router Chassis (0235A0G8) H3C SR8808 10G Core Router Chassis (0235A0G9) H3C SR8812 10G Core Router Chassis (0235A0GA) H3C SR8802 10G Core Router Chassis (0235A0GC) H3C SR8802 10G Core Router Chassis (0235A31B) H3C SR8805 10G Core Router Chassis (0235A31C) H3C SR8808 10G Core Router Chassis (0235A31D) H3C SR8812 10G Core Router Chassis (0235A31E)

7500 Switch Series Fix in progress use mitigations JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T JC697A HP A7502 TAA Main Processing Unit JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE JC700A HP A7500 384 Gbps TAA Fabric / MPU JC701A HP A7510 768 Gbps TAA Fabric / MPU JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports JD194A HP 384 Gbps Fabric A7500 Module JD194B HP 7500 384Gbps Fabric Module JD195A HP 7500 384Gbps Advanced Fabric Module JD196A HP 7502 Fabric Module JD220A HP 7500 768Gbps Fabric Module JD238A HP A7510 Switch Chassis JD238B HP 7510 Switch Chassis JD239A HP A7506 Switch Chassis JD239B HP 7506 Switch Chassis JD240A HP A7503 Switch Chassis JD240B HP 7503 Switch Chassis JD241A HP A7506 Vertical Switch Chassis JD241B HP 7506-V Switch Chassis JD242A HP A7502 Switch Chassis JD242B HP 7502 Switch Chassis JD243A HP A7503 Switch Chassis w/1 Fabric Slot JD243B HP 7503-S Switch Chassis w/1 Fabric Slot H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4) H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2) H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5) H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1) H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3) H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0) H3C S7502E Chassis w/ fans (0235A29A) H3C S7503E Chassis w/ fans (0235A27R) H3C S7503E-S Chassis w/ fans (0235A33R) H3C S7506E Chassis w/ fans (0235A27Q) H3C S7506E-V Chassis w/ fans (0235A27S)

HSR6800 Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU

HSR6800 Russian Version Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU

HSR6602 Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router

HSR6602 Russian Version Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router

A6600 Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

A6600 Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

6600 MCP Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

6600 MCP Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

5920 Switch Series Fix in progress use mitigations JG296A HP 5920AF-24XG Switch JG555A HP 5920AF-24XG TAA Switch

5900 Switch Series Fix in progress use mitigations JC772A HP 5900AF-48XG-4QSFP+ Switch JG336A HP 5900AF-48XGT-4QSFP+ Switch JG510A HP 5900AF-48G-4XG-2QSFP+ Switch JG554A HP 5900AF-48XG-4QSFP+ TAA Switch JG838A HP FF 5900CP-48XG-4QSFP+ Switch

5900 Virtual Switch Fix in progress use mitigations JG814AAE HP Virtual Switch 5900v VMware E-LTU JG815AAE HP VSO SW for 5900v VMware E-LTU

5830 Switch Series Fix in progress use mitigations JC691A HP A5830AF-48G Switch w/1 Interface Slot JC694A HP A5830AF-96G Switch JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot JG374A HP 5830AF-96G TAA Switch

5820 Switch Series Fix in progress use mitigations JC102A HP 5820-24XG-SFP+ Switch JC106A HP 5820-14XG-SFP+ Switch with 2 Slots JG219A HP 5820AF-24XG Switch JG243A HP 5820-24XG-SFP+ TAA-compliant Switch JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media modules Plus OSM (0235A37L) H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T (RJ45) (0235A370)

5800 Switch Series Fix in progress use mitigations JC099A HP 5800-24G-PoE Switch JC100A HP 5800-24G Switch JC101A HP 5800-48G Switch with 2 Slots JC103A HP 5800-24G-SFP Switch JC104A HP 5800-48G-PoE Switch JC105A HP 5800-48G Switch JG225A HP 5800AF-48G Switch JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots JG254A HP 5800-24G-PoE+ TAA-compliant Switch JG255A HP 5800-24G TAA-compliant Switch JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot JG258A HP 5800-48G TAA Switch w 1 Intf Slot H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot (0235A36U) H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP Plus ) Plus 1 media module PoE (0235A36S) H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus media module (no power) (0235A374) H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus ) Plus media module (0235A379) H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module (0235A378) H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM (0235A36W)

5500 HI Switch Series Fix in progress use mitigations JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt

5500 EI Switch Series Fix in progress use mitigations JD373A HP 5500-24G DC EI Switch JD374A HP 5500-24G-SFP EI Switch JD375A HP 5500-48G EI Switch JD376A HP 5500-48G-PoE EI Switch JD377A HP 5500-24G EI Switch JD378A HP 5500-24G-PoE EI Switch JD379A HP 5500-24G-SFP DC EI Switch JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts H3C S5500-28C-EI Ethernet Switch (0235A253) H3C S5500-28F-EI Eth Switch AC Single (0235A24U) H3C S5500-52C-EI Ethernet Switch (0235A24X) H3C S5500-28C-EI-DC Ethernet Switch (0235A24S) H3C S5500-28C-PWR-EI Ethernet Switch (0235A255) H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259) H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)

5500 SI Switch Series Fix in progress use mitigations JD369A HP 5500-24G SI Switch JD370A HP 5500-48G SI Switch JD371A HP 5500-24G-PoE SI Switch JD372A HP 5500-48G-PoE SI Switch JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts H3C S5500-28C-SI Ethernet Switch (0235A04U) H3C S5500-52C-SI Ethernet Switch (0235A04V) H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H) H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)

5120 EI Switch Series Fix in progress use mitigations JE066A HP 5120-24G EI Switch JE067A HP 5120-48G EI Switch JE068A HP 5120-24G EI Switch with 2 Slots JE069A HP 5120-48G EI Switch with 2 Slots JE070A HP 5120-24G-PoE EI Switch with 2 Slots JE071A HP 5120-48G-PoE EI Switch with 2 Slots JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ) H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS) H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR) H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT) H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU) H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)

5120 SI switch Series Fix in progress use mitigations JE072A HP 5120-48G SI Switch JE073A HP 5120-16G SI Switch JE074A HP 5120-24G SI Switch JG091A HP 5120-24G-PoE+ (370W) SI Switch JG092A HP 5120-24G-PoE+ (170W) SI Switch H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W) H3C S5120-20P-SI L2 16GE Plus 4SFP (0235A42B) H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D) H3C S5120-28P-HPWR-SI (0235A0E5) H3C S5120-28P-PWR-SI (0235A0E3)

4800 G Switch Series Fix in progress use mitigations JD007A HP 4800-24G Switch JD008A HP 4800-24G-PoE Switch JD009A HP 4800-24G-SFP Switch JD010A HP 4800-48G Switch JD011A HP 4800-48G-PoE Switch

3Com Switch 4800G 24-Port (3CRS48G-24-91) 3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91) 3Com Switch 4800G 48-Port (3CRS48G-48-91) 3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91) 3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)

4510G Switch Series Fix in progress use mitigations JF428A HP 4510-48G Switch JF847A HP 4510-24G Switch

3Com Switch 4510G 48 Port (3CRS45G-48-91) 3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91) 3Com Switch E4510-24G (3CRS45G-24-91)

4210G Switch Series Fix in progress use mitigations JF844A HP 4210-24G Switch JF845A HP 4210-48G Switch JF846A HP 4210-24G-PoE Switch

3Com Switch 4210-24G (3CRS42G-24-91) 3Com Switch 4210-48G (3CRS42G-48-91) 3Com Switch E4210-24G-PoE (3CRS42G-24P-91)

3610 Switch Series Fix in progress use mitigations JD335A HP 3610-48 Switch JD336A HP 3610-24-4G-SFP Switch JD337A HP 3610-24-2G-2G-SFP Switch JD338A HP 3610-24-SFP Switch H3C S3610-52P - model LS-3610-52P-OVS (0235A22C) H3C S3610-28P - model LS-3610-28P-OVS (0235A22D) H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E) H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)

3600 V2 Switch Series Fix in progress use mitigations JG299A HP 3600-24 v2 EI Switch JG300A HP 3600-48 v2 EI Switch JG301A HP 3600-24-PoE+ v2 EI Switch JG301B HP 3600-24-PoE+ v2 EI Switch JG302A HP 3600-48-PoE+ v2 EI Switch JG302B HP 3600-48-PoE+ v2 EI Switch JG303A HP 3600-24-SFP v2 EI Switch JG304A HP 3600-24 v2 SI Switch JG305A HP 3600-48 v2 SI Switch JG306A HP 3600-24-PoE+ v2 SI Switch JG306B HP 3600-24-PoE+ v2 SI Switch JG307A HP 3600-48-PoE+ v2 SI Switch JG307B HP 3600-48-PoE+ v2 SI Switch

3100V2 Fix in progress use mitigations JD313B HP 3100-24-PoE v2 EI Switch JD318B HP 3100-8 v2 EI Switch JD319B HP 3100-16 v2 EI Switch JD320B HP 3100-24 v2 EI Switch JG221A HP 3100-8 v2 SI Switch JG222A HP 3100-16 v2 SI Switch JG223A HP 3100-24 v2 SI Switch

3100V2-48 Fix in progress use mitigations JG315A HP 3100-48 v2 Switch

1910 Fix in progress use mitigations JE005A HP 1910-16G Switch JE006A HP 1910-24G Switch JE007A HP 1910-24G-PoE (365W) Switch JE008A HP 1910-24G-PoE(170W) Switch JE009A HP 1910-48G Switch JG348A HP 1910-8G Switch JG349A HP 1910-8G-PoE+ (65W) Switch JG350A HP 1910-8G-PoE+ (180W) Switch 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293) 3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093) 3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893) 3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93) 3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)

1810v1 P2 Fix in progress use mitigations J9449A HP 1810-8G Switch J9450A HP 1810-24G Switch

1810v1 PK Fix in progress use mitigations J9660A HP 1810-48G Switch

MSR20 Fix in progress use mitigations JD432A HP A-MSR20-21 Multi-Service Router JD662A HP MSR20-20 Multi-Service Router JD663A HP MSR20-21 Multi-Service Router JD663B HP MSR20-21 Router JD664A HP MSR20-40 Multi-Service Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326) H3C MSR 20-20 (0235A19H) H3C MSR 20-21 (0235A325) H3C MSR 20-40 (0235A19K) H3C MSR-20-21 Router (0235A19J)

MSR20-1X Fix in progress use mitigations JD431A HP MSR20-10 Router JD667A HP MSR20-15 IW Multi-Service Router JD668A HP MSR20-13 Multi-Service Router JD669A HP MSR20-13 W Multi-Service Router JD670A HP MSR20-15 A Multi-Service Router JD671A HP MSR20-15 AW Multi-Service Router JD672A HP MSR20-15 I Multi-Service Router JD673A HP MSR20-11 Multi-Service Router JD674A HP MSR20-12 Multi-Service Router JD675A HP MSR20-12 W Multi-Service Router JD676A HP MSR20-12 T1 Multi-Service Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router JG209A HP MSR20-12-T-W Router (NA) JG210A HP MSR20-13-W Router (NA) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) H3C MSR 20-10 (0235A0A7) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-11 (0235A31V) H3C MSR 20-12 (0235A32E) H3C MSR 20-12 T1 (0235A32B) H3C MSR 20-13 (0235A31W) H3C MSR 20-13 W (0235A31X) H3C MSR 20-15 A (0235A31Q) H3C MSR 20-15 A W (0235A31R) H3C MSR 20-15 I (0235A31N) H3C MSR 20-15 IW (0235A31P) H3C MSR20-12 W (0235A32G)

MSR30 Fix in progress use mitigations JD654A HP MSR30-60 POE Multi-Service Router JD657A HP MSR30-40 Multi-Service Router JD658A HP MSR30-60 Multi-Service Router JD660A HP MSR30-20 POE Multi-Service Router JD661A HP MSR30-40 POE Multi-Service Router JD666A HP MSR30-20 Multi-Service Router JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF232A HP RT-MSR3040-AC-OVS-AS-H3 JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S) H3C MSR 30-20 (0235A19L) H3C MSR 30-20 POE (0235A239) H3C MSR 30-40 (0235A20J) H3C MSR 30-40 POE (0235A25R) H3C MSR 30-60 (0235A20K) H3C MSR 30-60 POE (0235A25S) H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)

MSR30-16 Fix in progress use mitigations JD659A HP MSR30-16 POE Multi-Service Router JD665A HP MSR30-16 Multi-Service Router JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) H3C MSR 30-16 (0235A237) H3C MSR 30-16 POE (0235A238)

MSR30-1X Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) H3C RT-MSR3011-AC-OVS-H3 (0235A29L)

MSR50 Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR5040-DC-OVS-H3C (0235A20P) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L)

MSR50-G2 Fix in progress use mitigations JD429A HP MSR50 G2 Processor Module JD429B HP MSR50 G2 Processor Module H3C H3C MSR 50 Processor Module-G2 (0231A84Q) H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD(0231A0KL)

MSR20 Russian version Fix in progress use mitigations JD663B HP MSR20-21 Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326)

MSR20-1X Russian version Fix in progress use mitigations JD431A HP MSR20-10 Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router H3C MSR 20-10 (0235A0A7) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)

MSR30 Russian version Fix in progress use mitigations JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)

MSR30-1X Russian version Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C RT-MSR3011-AC-OVS-H3 (0235A29L) H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)

MSR30-16 Russian version Fix in progress use mitigations JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)

MSR50 Russian version Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR 50 Processor Module (0231A791) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR5040-DC-OVS-H3C (0235A20P)

MSR50 G2 Russian version Fix in progress use mitigations JD429B HP MSR50 G2 Processor Module H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL)

MSR9XX Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr JG207A HP MSR900-W Router (NA) JG208A HP MSR920-W Router (NA) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)

MSR9XX Russian version Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)

MSR93X Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router

MSR93X Russian version Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router

MSR1000 Fix in progress use mitigations JG732A HP MSR1003-8 AC Router

MSR2000 Fix in progress use mitigations JG411A HP MSR2003 AC Router

MSR3000 Fix in progress use mitigations JG404A HP MSR3064 Router JG405A HP MSR3044 Router JG406A HP MSR3024 AC Router JG409A HP MSR3012 AC Router JG861A HP MSR3024 TAA-compliant AC Router

MSR4000 Fix in progress use mitigations JG402A HP MSR4080 Router Chassis JG403A HP MSR4060 Router Chassis JG412A HP MSR4000 MPU-100 Main Processing Unit

F5000 Fix in progress use mitigations JG216A HP F5000 Firewall Standalone Chassis JD259A HP A5000-A5 VPN Firewall Chassis H3C SecPath F5000-A5 Host System (0150A0AG)

U200S and CS Fix in progress use mitigations JD268A HP 200-CS UTM Appliance JD273A HP U200-S UTM Appliance H3C SecPath U200-S (0235A36N)

U200A and M Fix in progress use mitigations JD274A HP 200-M UTM Appliance JD275A HP U200-A UTM Appliance H3C SecPath U200-A (0235A36Q)

F1000A and S Fix in progress use mitigations JD270A HP S1000-S VPN Firewall Appliance JD271A HP S1000-A VPN Firewall Appliance JG213A HP F1000-S-EI VPN Firewall Appliance JG214A HP F1000-A-EI VPN Firewall Appliance

SecBlade FW Fix in progress use mitigations JC635A HP 12500 VPN Firewall Module JD245A HP 9500 VPN Firewall Module JD249A HP 10500/7500 Advanced VPN Firewall Mod JD250A HP 6600 Firewall Processing Rtr Module JD251A HP 8800 Firewall Processing Module JD255A HP 5820 VPN Firewall Module H3C S9500E SecBlade VPN Firewall Module (0231A0AV) H3C S7500E SecBlade VPN Firewall Module (0231A832) H3C SR66 Gigabit Firewall Module (0231A88A) H3C SR88 Firewall Processing Module (0231A88L) H3C S5820 SecBlade VPN Firewall Module (0231A94J)

F1000E Fix in progress use mitigations JD272A HP S1000-E VPN Firewall Appliance

VSR1000 Fix in progress use mitigations JG810AAE HP VSR1001 Virtual Services Router JG811AAE HP VSR1001 Virtual Services Router JG812AAE HP VSR1004 Virtual Services Router JG813AAE HP VSR1008 Virtual Services Router

WX5002/5004 Fix in progress use mitigations JD441A HP 5800 ACM for 64-256 APs JD447B HP WX5002 Access Controller JD448A HP A-WX5004 Access Controller JD448B HP WX5004 Access Controller JD469A HP A-WX5004 (3Com) Access Controller JG261A HP 5800 Access Controller OAA TAA Mod

HP 850/870 Fix in progress use mitigations JG723A HP 870 Unified Wired-WLAN Appliance JG725A HP 870 Unifd Wrd-WLAN TAA Applnc

HP 830 Fix in progress use mitigations JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch

HP 6000 Fix in progress use mitigations JG639A HP 10500/7500 20G Unified Wired-WLAN Mod JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod

M220 Fix in progress use mitigations J9798A HP M220 802.11n AM Access Point J9799A HP M220 802.11n WW Access Point

NGFW Fix in progress use mitigations JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic JC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic JC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic JC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic JC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic

iMC UAM 7.0 Fix in progress use mitigations JD144A HP IMC UAM S/W Module w/200-User License JF388A HP IMC UAM S/W Module w/200-user License JD435A HP IMC EAD Client Software JF388AAE HP IMC UAM S/W Module w/200-user E-LTU JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU

iMC EAD 7.0 Fix in progress use mitigations JF391AAE HP IMC EAD S/W Module w/200-user E-LTU JG754AAE HP IMC EAD SW Module w/ 50-user E-LTU JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License JF391A HP IMC EAD S/W Module w/200-user License

iMC PLAT 7.0 Fix in progress use mitigations JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU JG747AAE HP IMC Standard Software Platform with 50-node E-LTU JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU JD125A HP IMC Standard Edition Software Platform with 100-node License JD815A HP IMC Standard Edition Software Platform with 100-node License JD816A HP A-IMC Standard Edition Software DVD Media JF377A HP IMC Standard Edition Software Platform with 100-node License JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU TJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL not HPNs) JF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU JG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU JD126A HP A-IMC Enterprise Software Platform with 200-node License JD808A HP A-IMC Enterprise Software Platform with 200-node License JD814A HP A-IMC Enterprise Edition Software DVD Media JF378A HP IMC Enterprise Edition Software Platform with 200-node License JG546AAE HP IMC Basic SW Platform w/50-node E-LTU JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU JG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU JG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition E-LTU JG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance Software E-LTU

HISTORY Version:1 (rev.1) - 20 June 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlOkrM4ACgkQ4B86/C0qfVn7/QCeK5T1H9dXfVQgIKSr5USqLmvq CtMAnjujH7e5aXfIOvxyyuB0FcSwIWCM =CEL7 -----END PGP SIGNATURE----- . OpenSSL is a 3rd party product that is embedded with some HP printer products. This bulletin notifies HP Printer customers about impacted products. To obtain the updated firmware, go to www.hp.com and follow these steps:

Select "Drivers & Software". Enter the appropriate product name listed in the table below into the search field. Click on "Search". Click on the appropriate product. Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" Note: If the "Cross operating system ..." link is not present, select applicable Windows operating system from the list. Select the appropriate firmware update under "Firmware".

Firmware Updates Table

Product Name Model Number Firmware Revision

HP Color LaserJet CM4540 MFP CC419A, CC420A, CC421A v 2302963_436067 (or higher)

HP Color LaserJet CP5525 CE707A,CE708A,CE709A v 2302963_436070 (or higher)

HP Color LaserJet Enterprise M750 D3L08A, D3L09A, D3L10A v 2302963_436077 (or higher)

HP Color LaserJet M651 CZ255A, CZ256A, CZ257A, CZ258A v 2302963_436073 (or higher)

HP Color LaserJet M680 CZ248A, CZ249A v 2302963_436072 (or higher)

HP Color LaserJet Flow M680 CZ250A, CA251A v 2302963_436072 (or higher)

HP LaserJet Enterprise 500 color MFP M575dn CD644A, CD645A v 2302963_436081 (or higher)

HP LaserJet Enterprise 500 MFP M525f CF116A, CF117A v 2302963_436069 (or higher)

HP LaserJet Enterprise 600 M601 Series CE989A, CE990A v 2302963_436082 (or higher)

HP LaserJet Enterprise 600 M602 Series CE991A, CE992A, CE993A v 2302963_436082 (or higher)

HP LaserJet Enterprise 600 M603 Series CE994A, CE995A, CE996A v 2302963_436082 (or higher)

HP LaserJet Enterprise MFP M630 series B3G84A, B3G85A, B3G86A, J7X28A v 2303714_233000041 (or higher)

HP LaserJet Enterprise 700 color M775 series CC522A, CC523A, CC524A, CF304A v 2302963_436079 (or higher)

HP LaserJet Enterprise 700 M712 series CF235A, CF236A, CF238A v 2302963_436080 (or higher)

HP LaserJet Enterprise 800 color M855 A2W77A, A2W78A, A2W79A v 2302963_436076 (or higher)

HP LaserJet Enterprise 800 color MFP M880 A2W76A, A2W75A, D7P70A, D7P71A v 2302963_436068 (or higher)

HP LaserJet Enterprise Color 500 M551 Series CF081A,CF082A,CF083A v 2302963_436083 (or higher)

HP LaserJet Enterprise color flow MFP M575c CD646A v 2302963_436081 (or higher)

HP LaserJet Enterprise flow M830z MFP CF367A v 2302963_436071 (or higher)

HP LaserJet Enterprise flow MFP M525c CF118A v 2302963_436069 (or higher)

HP LaserJet Enterprise M4555 MFP CE502A,CE503A, CE504A, CE738A v 2302963_436064 (or higher)

HP LaserJet Enterprise M806 CZ244A, CZ245A v 2302963_436075 (or higher)

HP LaserJet Enterprise MFP M725 CF066A, CF067A, CF068A, CF069A v 2302963_436078 (or higher)

HP Scanjet Enterprise 8500 Document Capture Workstation L2717A, L2719A v 2302963_436065 (or higher)

OfficeJet Enterprise Color MFP X585 B5L04A, B5L05A,B5L07A v 2302963_436066 (or higher)

OfficeJet Enterprise Color X555 C2S11A, C2S12A v 2302963_436074 (or higher)

HP Color LaserJet CP3525 CC468A, CC469A, CC470A, CC471A v 06.183.1 (or higher)

HP LaserJet M4345 Multifunction Printer CB425A, CB426A, CB427A, CB428A v 48.306.1 (or higher)

HP LaserJet M5025 Multifunction Printer Q7840A v 48.306.1 (or higher)

HP Color LaserJet CM6040 Multifunction Printer Q3938A, Q3939A v 52.256.1 (or higher)

HP Color LaserJet Enterprise CP4525 CC493A, CC494A, CC495A v 07.164.1 (or higher)

HP Color LaserJet Enterprise CP4025 CC489A, CC490A v 07.164.1 (or higher)

HP LaserJet M5035 Multifunction Printer Q7829A, Q7830A, Q7831A v 48.306.1 (or higher)

HP LaserJet M9050 Multifunction Printer CC395A v 51.256.1 (or higher)

HP LaserJet M9040 Multifunction Printer CC394A v 51.256.1 (or higher)

HP Color LaserJet CM4730 Multifunction Printer CB480A, CB481A, CB482A, CB483A v 50.286.1 (or higher)

HP LaserJet M3035 Multifunction Printer CB414A, CB415A, CC476A, CC477A v 48.306.1 (or higher)

HP 9250c Digital Sender CB472A v 48.293.1 (or higher)

HP LaserJet Enterprise P3015 CE525A,CE526A,CE527A,CE528A,CE595A v 07.186.1 (or higher)

HP LaserJet M3027 Multifunction Printer CB416A, CC479A v 48.306.1 (or higher)

HP LaserJet CM3530 Multifunction Printer CC519A, CC520A v 53.236.1 (or higher)

HP Color LaserJet CP6015 Q3931A, Q3932A, Q3933A, Q3934A, Q3935A v 04.203.1 (or higher)

HP LaserJet P4515 CB514A,CB515A, CB516A, CB517A v 04.213.1 (or higher)

HP Color LaserJet CM6030 Multifunction Printer CE664A, CE665A v 52.256.1 (or higher)

HP LaserJet P4015 CB509A, CB526A, CB511A, CB510A v 04.213.1 (or higher)

HP LaserJet P4014 CB507A, CB506A, CB512A v 04.213.1 (or higher)

HISTORY Version:1 (rev.1) - 22 September 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0445",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "nec",
            version: null,
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "6.2.3",
         },
         {
            model: "jboss enterprise web server",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "2.0.1",
         },
         {
            model: "jboss enterprise web platform",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "5.2.0",
         },
         {
            model: "power",
            scope: "eq",
            trust: 1.2,
            vendor: "ibm",
            version: "7200",
         },
         {
            model: "powerlinux 7r2",
            scope: "eq",
            trust: 1.2,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "application processing engine",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "2.0.2",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "0.10.29",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.1",
         },
         {
            model: "storage",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "cp1543-1",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.1.25",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "rox",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.16.1",
         },
         {
            model: "python",
            scope: "gte",
            trust: 1,
            vendor: "python",
            version: "2.7.0",
         },
         {
            model: "python",
            scope: "gte",
            trust: 1,
            vendor: "python",
            version: "3.4.0",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "s7-1500",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.6",
         },
         {
            model: "python",
            scope: "lt",
            trust: 1,
            vendor: "python",
            version: "2.7.8",
         },
         {
            model: "python",
            scope: "lt",
            trust: 1,
            vendor: "python",
            version: "3.4.2",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "server",
            scope: "lt",
            trust: 1,
            vendor: "filezilla",
            version: "0.9.45",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.2.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.9,
            vendor: "ibm",
            version: "7100",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.9,
            vendor: "ibm",
            version: "7400",
         },
         {
            model: "powerlinux 7r1",
            scope: "eq",
            trust: 0.9,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.9,
            vendor: "ibm",
            version: "5200",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "attachmate",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian gnu linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "fedora",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "global associates",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "nvidia",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openssl",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubuntu",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "vmware",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "10.4",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "11.4",
         },
         {
            model: "junos 11.4r9",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7700",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "10.1",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "10.0",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "5700",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7800",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7300",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7500",
         },
         {
            model: "junos 10.4s15",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "junos 13.2r2",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 10.4r15",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "11.1",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "junos 13.3r1",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 10.4s",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "11.2",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "10.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "11.4x27",
         },
         {
            model: "junos 11.4r8",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 10.4r16",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x45-d10",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "junos 12.1r7",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.6,
            vendor: "juniper",
            version: "10.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.110.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "power ps702",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "cloudplatform",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.30",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.117",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.112",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.46",
         },
         {
            model: "chrome for android",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.141",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "fortigate",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "integration bus",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9.1",
         },
         {
            model: "oncommand performance manager",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v210.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.10",
         },
         {
            model: "idataplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79120",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.155",
         },
         {
            model: "laserjet pro color printer m251n/nw cf147a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20020140919",
         },
         {
            model: "horizon view feature pack",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.3",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.5",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.0",
         },
         {
            model: "arubaos",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.4",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "cp1543-1",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.2.2",
         },
         {
            model: "vsphere virtual disk development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "fortimanager",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "laserjet p2055 printer series ce460a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20141201",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.35",
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "datafort e-series",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3690x571471.43",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v2-480",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "junos 11.4r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.5.4",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6.10",
         },
         {
            model: "junos 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos space ja1500 appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x571431.43",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "laserjet printer series q7543a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "laserjet enterprise flow mfp m525c cf118a 2302963 436069",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.20",
         },
         {
            model: "fortios b0537",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.06",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "laserjet enterprise m806 cz244a 2302963 436075",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.3",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "9.1-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "laserjet enterprise color m775 series cf304a 2302963 436079",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "fortirecorder",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "1.4.2",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.00",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.3.3",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "rational build forge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.32",
         },
         {
            model: "laserjet enterprise mfp m525f cf117a 2302963 436069",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "laserjet enterprise color m775 series cc522a 2302963 436079",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.15",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "secure analytics 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet enterprise color mfp m880 d7p70a 2302963 436068",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.6",
         },
         {
            model: "laserjet pro color mfp m276n/nw cf145a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20020140919",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1.100.3",
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "laserjet m9050 multifunction printer cc395a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x310025820",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "34.0",
         },
         {
            model: "junos 13.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "integrity superdome and hp converged system for sap hana",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "x9005.50.12",
         },
         {
            model: "asset manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.20",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.3",
         },
         {
            model: "algo one",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.8",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "sdn for virtual environments",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.2",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.5",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.5.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.1",
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7400",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.38",
         },
         {
            model: "tivoli workload scheduler distributed ga level",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2.0",
         },
         {
            model: "snapprotect",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "junos r8-s2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.34",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "color laserjet enterprise cp4525 cc495a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.49",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.342",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "oneview",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.10",
         },
         {
            model: "laserjet enterprise mfp m725 cf069a 2302963 436078",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.53",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.0.1",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.48",
         },
         {
            model: "nvp",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.2.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.1",
         },
         {
            model: "algo one",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "database and middleware automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "tekelec hlr router",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "open systems snapvault agent",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web security gateway anywhere",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7",
         },
         {
            model: "laserjet p4515 cb515a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "laserjet pro mfp m425dn/dw cf286a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020140919",
         },
         {
            model: "laserjet enterprise m712 series cf236a 2302963 436080",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.49",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "idol speech software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.5.0.16091",
         },
         {
            model: "laserjet enterprise color m551 series cf082a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.124",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.1",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5.2",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.32",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.14",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "laserjet enterprise mfp m725 cf066a 2302963 436078",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.40",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.10",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.0",
         },
         {
            model: "wx5002/5004 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "netscaler 9.3.e",
            scope: null,
            trust: 0.3,
            vendor: "citrix",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.71",
         },
         {
            model: "laserjet m9040 multifunction printer cc394a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "51.256.1",
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.46",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "junos space 13.3r1.8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.4",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise communications broker pcz2.0.0m4p5",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.1",
         },
         {
            model: "aura application server sip core pb23",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "vsr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.33",
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os beta",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.130.14",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.10",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.14",
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.16",
         },
         {
            model: "junos r4-s2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.128.3",
         },
         {
            model: "virtuozzo containers for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "4.6",
         },
         {
            model: "laserjet p4015 cb526a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "laserjet enterprise mfp m630 series j7x28a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "laserjet p3005 printer series q7813a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2.190.3",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.4",
         },
         {
            model: "vsphere virtual disk development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.24",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.37",
         },
         {
            model: "10.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "710/7300",
         },
         {
            model: "vdi-in-a-box",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.8",
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.3",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.08",
         },
         {
            model: "airwave",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "7.4",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "server",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "0",
         },
         {
            model: "nextscale nx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "54550",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.52",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.110",
         },
         {
            model: "network connect 8.0r3.1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.8",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0",
         },
         {
            model: "p2000 g3 msa array system ts251p006",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "laserjet printer series q5404a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42508.250.2",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.5",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.1.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "flex system p270",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7954-24x)0",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.04",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.10",
         },
         {
            model: "laserjet p4015 cb509a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.2",
         },
         {
            model: "tivoli workload scheduler distributed fp05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "tivoli workload scheduler distributed fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "endeca information discovery studio",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.18",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.3",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.5",
         },
         {
            model: "laserjet m5035 multifunction printer q7829a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.38",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5.2.3",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "laserjet enterprise m602 series ce992a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "fortiwifi",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "laserjet enterprise m712 series cf238a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.4",
         },
         {
            model: "junos 12.1r8-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.344",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x375087220",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "content analysis system software",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.5.5",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.14",
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "websphere datapower xml accelerator xa35",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.7",
         },
         {
            model: "(comware family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12500v7)0",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.11",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.50",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v5000-",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.72",
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "intelligencecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "strm 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "financial services lending and leasing",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "14.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "fortimail build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8546",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.55",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.5",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "player",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "9.0.3",
         },
         {
            model: "sbr global enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "color laserjet printer series q7533a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "300046.80.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.10",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.19",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "power ps700",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.7",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "laserjet enterprise m712 series cf235a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "color laserjet cp5525 ce708a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.12",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura application server sip core pb28",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.2",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.48",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.5.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.41",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.9",
         },
         {
            model: "secure analytics 2014.2r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "color laserjet cm4540 mfp cc421a 2302963 436067",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "color laserjet cp6015 q3934a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.6",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.24",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ape",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "2.0",
         },
         {
            model: "junos 12.1r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "p2000 g3 msa array system ts251p005",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "idol software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.8",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.1",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "key",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.14",
         },
         {
            model: "laserjet p4515 cb515a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "worklight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "laserjet enterprise color m775 series cc523a 2302963 436079",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.01",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.11",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1",
         },
         {
            model: "power 780",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "power express f/c",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "52056340",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.53",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.4",
         },
         {
            model: "junos 12.2r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.7",
         },
         {
            model: "u200s and cs family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "security threat response manager 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "28.0.1500.71",
         },
         {
            model: "pulse desktop 5.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.2",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.7",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "winscp",
            scope: "ne",
            trust: 0.3,
            vendor: "winscp",
            version: "5.5.4",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.04",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.3",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.02",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "laserjet m3035 multifunction printer cc476a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "hsr6800 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "management center",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.3",
         },
         {
            model: "color laserjet m651 cz258a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v5)0",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "3.4.1",
         },
         {
            model: "9.3-beta1-p2",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "junos 12.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "message networking sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "officejet enterprise color mfp b5l05a 2302963 436066",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "x585",
         },
         {
            model: "color laserjet cm4540 mfp cc420a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "dgs-1210-52",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "4.00.025",
         },
         {
            model: "ngfw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.31",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.57",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.3",
         },
         {
            model: "msr9xx russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "junos 12.3r4-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.14",
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9.3",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1.1",
         },
         {
            model: "ive os 7.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system p260",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-23x)0",
         },
         {
            model: "laserjet enterprise m806 cz244a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "usage meter",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.3",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.73",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "proxyav",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.4.2.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.3",
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.56",
         },
         {
            model: "horizon mirage edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "4.4.2",
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "virtuozzo containers for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "4.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "color laserjet cm4730 multifunction printer cb480a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.54",
         },
         {
            model: "sbr enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "laserjet enterprise p3015 ce527a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "flex system fabric cn4093 10gb converged scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.8",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.014",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.154",
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.4",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "laserjet cm3530 multifunction printer cc519a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "laserjet pro color mfp m276n/nw cf144a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20020140919",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58000",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb481a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "email appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "3.7.0.0",
         },
         {
            model: "email security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.3",
         },
         {
            model: "junos os 12.1x46-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "player",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "10.0.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.10",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.43",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.13",
         },
         {
            model: "junos 12.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.4",
         },
         {
            model: "network connect 7.4r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msa storage gl200r007",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1040",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.4",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.10",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "rox",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "11.16.1",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet p4014 cb506a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.0",
         },
         {
            model: "arubaos",
            scope: "ne",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.3.1.8",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.6",
         },
         {
            model: "system x3500m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73801.42",
         },
         {
            model: "licensing",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x325025830",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.53",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v7)0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "idol image server",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "10.7",
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloudplatform",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.2.1-x",
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "laserjet enterprise color m551 series cf081a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.0",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.2",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.0--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "laserjet enterprise color m855 a2w78a 2302963 436076",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.2",
         },
         {
            model: "color laserjet printer series q5984a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "380046.80.8",
         },
         {
            model: "simatic cp1543-1",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "1.1",
         },
         {
            model: "power express f/c",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "52056330",
         },
         {
            model: "color laserjet cp5525 ce707a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "9.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73231.42",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.3-66.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.23",
         },
         {
            model: "laserjet p4014 cb507a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "bladecenter js43 with feature code",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7778-23x8446)0",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.18",
         },
         {
            model: "junos space 11.4r5.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system storage ts2900 tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0026",
         },
         {
            model: "junos 12.1r7-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "8.4-release-p12",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "netcool/system service monitor fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.014",
         },
         {
            model: "exalogic",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "x2-22.0.6.2.0",
         },
         {
            model: "color laserjet m680 cz248a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "bbm for android",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.46",
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.6.0",
         },
         {
            model: "color laserjet enterprise cp4025 cc489a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.164.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "laserjet m3027 multifunction printer cb416a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "laserjet pro mfp m425dn/dw cf288a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020140919",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "junos 12.1r5-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x363071580",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.29",
         },
         {
            model: "asset manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.30",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.1",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.1.1",
         },
         {
            model: "content analysis system",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "vsphere storage appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.1",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "elan",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "8.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.15",
         },
         {
            model: "tivoli storage productivity center fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.0",
         },
         {
            model: "laserjet m5035 multifunction printer q7831a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.2",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "msr2000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "email security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "color laserjet printer series cb433a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.3",
         },
         {
            model: "laserjet enterprise m712 series cf236a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "communicator for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.1",
         },
         {
            model: "color laserjet printer series q7535a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "300046.80.2",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "8.1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.7",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "bladecenter js12 express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7998-60x)0",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.12",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "laserjet multifunction printer series q3943a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43459.310.2",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet p4015 cb526a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "cms r16 r6",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "system x3200m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73271.42",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.115",
         },
         {
            model: "cit",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.52",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "management center",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.3.2.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.12",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.0",
         },
         {
            model: "color laserjet cp3505 printer series ce491a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.160.2",
         },
         {
            model: "laserjet m5035 multifunction printer q7830a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "algo one",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.4.0.15779",
         },
         {
            model: "color laserjet cp3525 cc468a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.183.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura application server sip core pb5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "view client",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "4.0",
         },
         {
            model: "host agent for oncommand core package",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "mcp russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.0.0.12141",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.159",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.24",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.93",
         },
         {
            model: "color laserjet printer series q7495a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "a6600 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.817",
         },
         {
            model: "laserjet enterprise m602 series ce991a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "f5000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "color laserjet cm6030 multifunction printer ce664a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52.256.1",
         },
         {
            model: "9.2-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "color laserjet enterprise cp4025 cc489a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "network connect 7.4r9.1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vcsa",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "idataplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79130",
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "color laserjet cp3525 cc471a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.183.1",
         },
         {
            model: "laserjet enterprise flow mfp m525c cf118a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos r11",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "laserjet enterprise color flow mfp m575c cd646a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet m3035 multifunction printer cb415a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "junos 10.4s13",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.3",
         },
         {
            model: "laserjet cm3530 multifunction printer cc520a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.7",
         },
         {
            model: "sdn for virtual environments",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.0",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.44",
         },
         {
            model: "color laserjet cp5525 ce708a 2302963 436070",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "cognos express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "pk family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "color laserjet cp6015 q3935a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "3par service processor sp-4.2.0.ga-29.p002",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1.10",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet enterprise m602 series ce993a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.126",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "laserjet m4345 multifunction printer cb427a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "laserjet p4515 cb517a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "color laserjet cp5525 ce709a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet m5025 multifunction printer q7840a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "color laserjet cp6015 q3933a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.20",
         },
         {
            model: "color laserjet flow m680 cz250a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 11.4r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.2",
         },
         {
            model: "color laserjet cp3505 printer series cb444a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.160.2",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.5.3",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.10",
         },
         {
            model: "web security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7",
         },
         {
            model: "color laserjet printer series cb432a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "cognos express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "horizon view client",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.3.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.00",
         },
         {
            model: "color laserjet multifunction printer series q7519a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90006.1.20",
         },
         {
            model: "flashsystem 9848-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "malware analysis appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.2.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.31",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.00",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.6.2",
         },
         {
            model: "junos os 12.1x47-d15",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "junos 13.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vfabric application director",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.10",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.2",
         },
         {
            model: "cloud service automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.00",
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cluster network/management switches",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "vma san gateway g5.5.1",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "flex system p260 compute node /fc efd9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "system storage ts2900 tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0025",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8300",
         },
         {
            model: "color laserjet cm6040 multifunction printer q3938a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "chargeback manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.6",
         },
         {
            model: "fortianalyzer",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2",
         },
         {
            model: "color laserjet m651 cz258a 2302963 436073",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5950",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "flex system p260",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-22x)0",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.7",
         },
         {
            model: "secblade fw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.5.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.42",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "bbm for iphone",
            scope: "ne",
            trust: 0.3,
            vendor: "rim",
            version: "2.2.1.24",
         },
         {
            model: "vsphere sdk for perl",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "laserjet enterprise color mfp m880 a2w76a 2302963 436068",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0.1650.59",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.1",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uacos c4.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.7",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.125",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.0.9.8",
         },
         {
            model: "laserjet enterprise p3015 ce528a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.186.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.3",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "idol speech software",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "10.7",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "color laserjet enterprise cp4525 cc494a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.7",
         },
         {
            model: "vcenter operations manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.8.1",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9.5",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.30",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.51",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364160",
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.4",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "msr50 g2 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4",
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7080",
         },
         {
            model: "dgs-1500-52",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "2.51.005",
         },
         {
            model: "junos 11.4r6-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet m9040 multifunction printer cc394a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.1",
         },
         {
            model: "color laserjet cp3525 cc470a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.122",
         },
         {
            model: "laserjet pro color printer m251n/nw cf146a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20020140919",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "laserjet printer series q5401a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42508.250.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.47",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "power ps703 blade",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7891-73x)0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "3.3.1",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.36",
         },
         {
            model: "system storage ts3400 tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0039",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.6",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "flex system p460 compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-43x)0",
         },
         {
            model: "update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "openvpn",
            scope: "ne",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.3.4",
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "6.1.2",
         },
         {
            model: "freedome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "fortios b0630",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.00",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.60",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.1.0",
         },
         {
            model: "oncommand unified manager host package",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "web security",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.4.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.14",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.1",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v19.7",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.11",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "flex system p270 compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7954-24x)0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58200",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.52",
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cf285a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "crossbow",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "system x3650m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79471.42",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.0",
         },
         {
            model: "system x3200m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73281.42",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.16",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.39",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "color laserjet cm6040 multifunction printer q3939a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "color laserjet cp6015 q3933a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.76",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "10.0-release-p5",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "laserjet m3027 multifunction printer cc479a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.1",
         },
         {
            model: "laserjet multifunction printer series q3942a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43459.310.2",
         },
         {
            model: "crossbow",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "4.2.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.2",
         },
         {
            model: "junos 10.4s14",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.25",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "laserjet m4345 multifunction printer cb428a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uacos c4.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "color laserjet m651 cz255a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.16",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.11",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "storeever msl6480 tape library",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.40",
         },
         {
            model: "msr3000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "color laserjet enterprise m750 d3l09a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos space 13.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.013",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.3",
         },
         {
            model: "laserjet enterprise color m855 a2w79a 2302963 436076",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.67",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "operations automation",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "5.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.20",
         },
         {
            model: "4800g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "flex system p460",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-43x)0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.7",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.4",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.00",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.31",
         },
         {
            model: "laserjet enterprise m4555 mfp ce503a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.11",
         },
         {
            model: "sylpheed",
            scope: "ne",
            trust: 0.3,
            vendor: "sylpheed",
            version: "3.4.2",
         },
         {
            model: "host checker",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.3",
         },
         {
            model: "junos space ja2500 appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.0",
         },
         {
            model: "laserjet m5035 multifunction printer q7831a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.10",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "receiver",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.12",
         },
         {
            model: "secure work space",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "0",
         },
         {
            model: "color laserjet cp6015 q3935a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.2",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb482a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.37",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "collaboration services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.16",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.49",
         },
         {
            model: "color laserjet cp6015 q3933a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.6",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.13",
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idol software",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "10.7",
         },
         {
            model: "workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "9.0.3",
         },
         {
            model: "puredata system for hadoop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.02",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.3",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79130",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v310.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.169",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.4",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.26",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "laserjet printer series q5409a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43508.250.2",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g85a 2303714 233000041",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.2",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.0",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "color laserjet multifunction printer series cb483a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dgs-1500-28p",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "2.51.005",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 11.4r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.1.1",
         },
         {
            model: "a6600 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.5.1",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1",
         },
         {
            model: "laserjet multifunction printer series q3728a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.290.2",
         },
         {
            model: "junos space 12.3r2.8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system x3650m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79451.42",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.36",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "color laserjet cp6015 q3932a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.9",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "vcloud networking and security",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1.2",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "vsphere support assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "laserjet m4345 multifunction printer cb426a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.34",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.19",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "14.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.65",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.3",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.1",
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.7.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.16",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.011",
         },
         {
            model: "junos r7",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.29",
         },
         {
            model: "storeever msl6480 tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "junos os 11.4r12-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2",
         },
         {
            model: "3par service processor sp-4.3.0.ga-17.p001",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "laserjet printer series q5407a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43508.250.2",
         },
         {
            model: "laserjet enterprise color mfp m880 a2w76a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "laserjet enterprise color m775 series cc524a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "laserjet p4515 cb515a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "junos 12.1r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "junos 11.4r10-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.45",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cit",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.41",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.116",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.73",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.67",
         },
         {
            model: "junos 12.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.11",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.1",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.015",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.09",
         },
         {
            model: "sbr carrier 8.0.0-r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.1",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cf399a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "color laserjet cp3525 cc469a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.183.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.1",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet enterprise color m775 series cc522a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "msr20 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "forticlient",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.614",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "asset manager 9.41.p1",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.6",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.57",
         },
         {
            model: "msr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.88",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.3",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "utm manager",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "4.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.51",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.9",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3",
         },
         {
            model: "cloud server",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "6.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.16",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "system x3630m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73771.42",
         },
         {
            model: "workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "10.0.2",
         },
         {
            model: "rational build forge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.22",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "1.4.1",
         },
         {
            model: "enterprise linux long life 5.9.server",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "powerlinux 7r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "vcenter chargeback manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.6",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.1.0.18193",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "color laserjet cp6015 q3931a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73211.42",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2",
         },
         {
            model: "infosphere balanced warehouse c4000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "fusion",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.123",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.7",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "jetdirect ew2500 802.11b/g wireless print server j8021a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "41.16",
         },
         {
            model: "cit",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.53",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb483a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "50.286.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1",
         },
         {
            model: "junos r2-s2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.12",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7900.00",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.50",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.1",
         },
         {
            model: "client connector",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.91",
         },
         {
            model: "laserjet enterprise m4555 mfp ce738a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos os 12.2r9",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "color laserjet cm4730 multifunction printer cb480a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "50.286.1",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.2",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.1.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4",
         },
         {
            model: "communicator for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "lifetime key management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.20",
         },
         {
            model: "vix api",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.12",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb481a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "50.286.1",
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cf270a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "laserjet enterprise color m855 a2w78a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.15",
         },
         {
            model: "message networking sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "strm",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.26",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "infosphere balanced warehouse d5100",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "junos 13.2r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 11.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "websphere datapower xml accelerator xa35",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0",
         },
         {
            model: "laserjet enterprise color m775 series cc523a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "laserjet p4014 cb507a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "database and middleware automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.10",
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.0",
         },
         {
            model: "8.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.047.8",
         },
         {
            model: "enterprise linux server eus 6.4.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "vcd",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.11",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "laserjet enterprise color m551 series cf083a 2302963 436083",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.2",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "enterprise server x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.5",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet p2055 printer series ce456a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20141201",
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "9250c digital sender cb472a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "netiq admininstration console server",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.131",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "sparc m10-4",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "0",
         },
         {
            model: "junos 13.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "software foundation python",
            scope: "eq",
            trust: 0.3,
            vendor: "python",
            version: "3.5",
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7100",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "laserjet enterprise color m855 a2w79a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.0-76.7",
         },
         {
            model: "bbm for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.4",
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "color laserjet cp6015 q3934a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8721",
         },
         {
            model: "color laserjet m651 cz257a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.0",
         },
         {
            model: "laserjet enterprise m4555 mfp ce502a 2302963 436064",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "vsphere virtual disk development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "ive os 8.0r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system storage ts2900 tape librray",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "0033",
         },
         {
            model: "laserjet enterprise m4555 mfp ce504a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "laserjet cm3530 multifunction printer cc519a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.9",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.0-77.5",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.3",
         },
         {
            model: "laserjet p3005 printer series q7816a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2.190.3",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.6",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos os 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet p4515 cb516a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.172",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "aura application server sip core pb19",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "bladecenter js22",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7998-61x)0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.15",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.65",
         },
         {
            model: "executive scorecard",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.41",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "infosphere balanced warehouse c3000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.6",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.4",
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uacos c5.0",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "strm/jsa",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "z/tpf",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.10",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.40",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "laserjet enterprise color mfp m880 d7p70a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "laserjet p4515 cb514a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "puredata system for operational analytics a1791",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.6",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.55",
         },
         {
            model: "system x3400m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "78361.42",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.2",
         },
         {
            model: "fortirecorder",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "1.5",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos insight standalone fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "bladecenter js23",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7778-23x)0",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.5",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.0",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "msa storage gl200r007",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2040",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "icewall sso certd r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "command view server based management",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.3.2",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "laserjet printer series q7697a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.161",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.6",
         },
         {
            model: "fortigate",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.5",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9500e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet enterprise m712 series cf235a 2302963 436080",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "fortisandbox build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "1.3.086",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.4",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "23.0.1271.94",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "vcenter site recovery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0.31",
         },
         {
            model: "dgs-1210-28p",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "4.00.043",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.75",
         },
         {
            model: "color laserjet m680 cz248a 2302963 436072",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.91",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "ape",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x330073820",
         },
         {
            model: "asset manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.40",
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.3-64.4",
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.19",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "enterprise linux server eus 6.3.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0",
         },
         {
            model: "junos 10.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.10.140.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.32",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.6",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.1.3",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "6.5",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "laserjet p3005 printer series q7814a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2.190.3",
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v110.1",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "20",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "36100",
         },
         {
            model: "ive os 7.4r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.21",
         },
         {
            model: "hi switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.7",
         },
         {
            model: "laserjet enterprise m4555 mfp ce503a 2302963 436064",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "msr9xx family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "vcenter site recovery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1.1",
         },
         {
            model: "nsx for multi-hypervisor",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "4.1.2",
         },
         {
            model: "laserjet printer series q7698a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "sbr enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.17",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.63",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "junos os 13.3r2-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp07",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "msr30 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "scale out network attached storage",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.0.4",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.0.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x375087330",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.20",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "color laserjet enterprise cp4525 cc493a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.164.1",
         },
         {
            model: "executive scorecard",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.40",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.22",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.2",
         },
         {
            model: "websphere datapower b2b appliance xb62",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "laserjet multifunction printer series q3726a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.290.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.82",
         },
         {
            model: "color laserjet cp4005 printer series cb504a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "46.230.6",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.0.74.4",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "junos space 12.3p2.8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.85",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.60",
         },
         {
            model: "pulse desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.0",
         },
         {
            model: "rational insight ifix1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "fortios",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "tivoli workload scheduler distributed fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "laserjet m4345 multifunction printer cb425a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "laserjet enterprise m602 series ce991a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "malware analysis appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1.2",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.1.0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.126.0",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "color laserjet flow m680 ca251a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.4",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.9",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.0",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "bbm for android",
            scope: "ne",
            trust: 0.3,
            vendor: "rim",
            version: "2.2.1.40",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "virtual automation",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.68",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "color laserjet enterprise cp4025 cc490a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.34",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.50",
         },
         {
            model: "color laserjet multifunction printer series cb481a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "laserjet printer series q7545a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "junos 13.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2143",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19100",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet printer series q5406a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43508.250.2",
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "forticlient build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0591",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.34",
         },
         {
            model: "studio",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.60",
         },
         {
            model: "aura conferencing sp1 standard",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "laserjet enterprise mfp m525f cf116a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "color laserjet cp3525 cc468a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cloudplatform",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.2",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.10",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27.62",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x310054570",
         },
         {
            model: "vcd",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1.3",
         },
         {
            model: "9.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.4",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "one-x mobile ces for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "junos os 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59200",
         },
         {
            model: "security analytics platform",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1.3",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "management center",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1",
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 11.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "xiv storage system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "281011.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.20",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "junos 12.1x45-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "system x3500m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "78391.42",
         },
         {
            model: "utm",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "9.2",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "color laserjet cp5525 ce707a 2302963 436070",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "enterprise linux els",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3500-",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.26",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.13",
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "11.00",
         },
         {
            model: "color laserjet cm6030 multifunction printer ce664a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "9.20",
         },
         {
            model: "color laserjet cp3525 cc471a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.155",
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos space r1.8",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.1.4",
         },
         {
            model: "webapp secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.11",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.70",
         },
         {
            model: "utm",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "8.3",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087180",
         },
         {
            model: "laserjet enterprise p3015 ce526a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.50",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.14",
         },
         {
            model: "junos 12.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.4",
         },
         {
            model: "color laserjet cp6015 q3934a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.170",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3700-",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.92",
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "88704.76.0",
         },
         {
            model: "web security gateway anywhere",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.1",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "5.0",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.0",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.21",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x638370",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.85",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0",
         },
         {
            model: "color laserjet multifunction printer series cb480a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "vm virtualbox 4.2.0-rc3",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "color laserjet cm4540 mfp cc421a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.5.2",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.50",
         },
         {
            model: "color laserjet multifunction printer series cb482a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.16",
         },
         {
            model: "sdn for virtual environments",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "laserjet multifunction printer series q3944a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43459.310.2",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.3",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos os 13.2r5",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.51",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.8",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "junos 10.4r14",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "laserjet printer series q5403a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42508.250.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.56",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vcsa",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.343",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "color laserjet printer series q5982a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "380046.80.8",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.4",
         },
         {
            model: "junos pulse 4.0r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.12",
         },
         {
            model: "cognos planning fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "junos -d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "p2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.28",
         },
         {
            model: "junos space 13.1r1.6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "view client",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.3.1",
         },
         {
            model: "junos 10.0s25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 10.4r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73251.42",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.13",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.52",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.3",
         },
         {
            model: "color laserjet cm6040 multifunction printer q3939a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52.256.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.18",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.28",
         },
         {
            model: "junos 10.4r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "vsphere storage appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1.3",
         },
         {
            model: "laserjet p4015 cb511a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.0.1",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.17",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.18",
         },
         {
            model: "junos 12.3r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.36",
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.29",
         },
         {
            model: "datafort s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.4",
         },
         {
            model: "core",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "9",
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "management center",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2.1.1",
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cf274a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.0",
         },
         {
            model: "blackberry link",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "1.2",
         },
         {
            model: "msr20-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.77",
         },
         {
            model: "8.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura conferencing standard",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.17",
         },
         {
            model: "one-x mobile ces for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.4",
         },
         {
            model: "system x3650m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "54541.42",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.7",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x325054580",
         },
         {
            model: "cognos insight standalone",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "junos 11.4r5-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ive os 8.0r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.13",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.36",
         },
         {
            model: "junos os 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0",
         },
         {
            model: "fortiweb",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.1",
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.114",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8.106",
         },
         {
            model: "lifetime key management software",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "vcenter converter standalone",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb482a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "50.286.1",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.22",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "horizon workspace server gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.8.1",
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.89",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "junos 12.1r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.07",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.56",
         },
         {
            model: "laserjet multifunction printer series q3945a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43459.310.2",
         },
         {
            model: "websphere datapower xml accelerator xa35",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.15",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "executive scorecard",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.5",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.21",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.14",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.4",
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "60000",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.1",
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.21",
         },
         {
            model: "netiq identity server",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "color laserjet enterprise cp4525 cc495a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.164.1",
         },
         {
            model: "junos 12.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.80",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.5.2",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.107",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "flex system p260 compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-23x)0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g84a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.4",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "arubaos",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.3",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "vcsa",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "color laserjet enterprise m750 d3l10a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.27",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.170",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "horizon workspace client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.8.1",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.20",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.1",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.2",
         },
         {
            model: "laserjet m3035 multifunction printer cc476a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "laserjet enterprise flow m830z mfp cf367a 2302963 436071",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "power",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5750",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "config advisor",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "color laserjet cm4540 mfp cc420a 2302963 436067",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "color laserjet enterprise cp4525 cc494a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.164.1",
         },
         {
            model: "laserjet enterprise mfp m725 cf067a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "color laserjet printer series q7492a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.9",
         },
         {
            model: "eucalyptus",
            scope: "eq",
            trust: 0.3,
            vendor: "eucalyptus",
            version: "4.0",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "color laserjet m680 cz249a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet m3035 multifunction printer cc477a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "fortimanager",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.12",
         },
         {
            model: "forticlient",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.10",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.22",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.0",
         },
         {
            model: "websphere datapower low latency appliance xm70",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.15",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos insight standalone fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "oncommand balance",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "f1000a and s family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "stunnel",
            scope: "ne",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.02",
         },
         {
            model: "u200a and m family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.57",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.6",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "850/8700",
         },
         {
            model: "officejet enterprise color c2s12a 2302963 436074",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "x555",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70000",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5.2.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.11",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.4.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.66",
         },
         {
            model: "junos d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "color laserjet cm4540 mfp cc419a 2302963 436067",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.3",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.31",
         },
         {
            model: "vcenter converter standalone",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "hsr6602 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.44",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "one-x mobile for blackberry",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.5",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.50",
         },
         {
            model: "9.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.14",
         },
         {
            model: "laserjet m4345 multifunction printer cb425a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.6",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.07",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.8",
         },
         {
            model: "junos space 14.1r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27.44",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.22",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "color laserjet m651 cz255a 2302963 436073",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "scanjet enterprise document capture workstation l2717a 2302963 436065",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8500",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.19",
         },
         {
            model: "laserjet p4015 cb510a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.99",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.168",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "cloudsystem foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "9.0-rc3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos 13.3r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.41",
         },
         {
            model: "junos 12.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "vcd",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.6.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x638370",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "elan",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "8.3.3",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.1",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.3",
         },
         {
            model: "laserjet enterprise color mfp m575dn cd645a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "system x3250m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "42511.42",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "laserjet enterprise m806 cz245a 2302963 436075",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.4",
         },
         {
            model: "suse core for",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "9x86",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "junos 13.2r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "horizon workspace server data",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.8.1",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0.1025308",
         },
         {
            model: "9.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.81",
         },
         {
            model: "storage encryption",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.4",
         },
         {
            model: "laserjet m3027 multifunction printer cb416a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.99",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.108",
         },
         {
            model: "xenclient enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "5.1.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g84a 2303714 233000041",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "netscaler ipmi/lom interface",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "msr20 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "85704.76.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.9",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "color laserjet m680 cz249a 2302963 436072",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.62",
         },
         {
            model: "servicecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.30",
         },
         {
            model: "sparc m10-4s",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "0",
         },
         {
            model: "fortiauthenticator build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1.060",
         },
         {
            model: "laserjet enterprise m601 series ce990a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129000",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "vcenter support assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.14",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0",
         },
         {
            model: "sbr carrier 7.6.0-r10",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.56",
         },
         {
            model: "hsr6800 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet printer series q7552a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "scanjet enterprise document capture workstation l2717a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "85000",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.39",
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.3.0",
         },
         {
            model: "bladecenter js23/js43",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7778-23x)0",
         },
         {
            model: "enterprise linux desktop client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.185",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.2",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "laserjet printer series q3721a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "flex system fabric en4093 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.5",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "messagesight server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "secblade iii",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "safe profile",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.79",
         },
         {
            model: "junos 13.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "laserjet m5035 multifunction printer q7830a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "jetdirect 640n eio card j8025a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "45.35",
         },
         {
            model: "junos 13.2r5",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.2",
         },
         {
            model: "vdi-in-a-box",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "5.4.4",
         },
         {
            model: "itbm standard",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.00",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.2",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "color laserjet cp3525 cc469a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 13.1r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1.11",
         },
         {
            model: "fortivoiceos build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.3165",
         },
         {
            model: "laserjet enterprise color m551 series cf082a 2302963 436083",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "secure analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.4",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.17",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "laserjet printer series q3722a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.00",
         },
         {
            model: "junos pulse 5.0r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.14",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.22",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "enterprise linux eus 5.9.z server",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.7.3",
         },
         {
            model: "laserjet p4515 cb516a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.3",
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "management center",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "datafort management console",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.05",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "f1000e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.113",
         },
         {
            model: "laserjet enterprise m601 series ce989a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "junos 11.4r6.6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.40",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19200",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.3",
         },
         {
            model: "color laserjet cm4540 mfp cc419a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.3",
         },
         {
            model: "vsphere replication",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.6",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr93x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "airwave",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "0",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.01",
         },
         {
            model: "big data extensions",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "junos space 12.3r1.3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.19",
         },
         {
            model: "junos 11.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr50 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "laserjet m5025 multifunction printer q7840a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "flex system p260 compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-22x)0",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "virtuozzo containers for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "4.7",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5",
         },
         {
            model: "junos 12.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet enterprise m603 series ce994a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "vsphere support assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.37",
         },
         {
            model: "airwave",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "7.2",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "laserjet enterprise m806 cz245a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "color laserjet printer series q7493a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "msr50 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.0",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.3",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.61",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.41",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos 10.0s28",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "algo one",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "color laserjet cp6015 q3931a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "color laserjet enterprise cp4525 cc493a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.4",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.4.2",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "utm",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "9.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.40",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.07",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1183.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.7",
         },
         {
            model: "fortigate build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.18",
         },
         {
            model: "junos os 12.3r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cms r17 r3",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "horizon workspace",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.8.1",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "websphere datapower b2b appliance xb62",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.10",
         },
         {
            model: "color laserjet cm6030 multifunction printer ce665a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52.256.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.16",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.79",
         },
         {
            model: "manageability sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.13",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "fortiwifi",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "vix api",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.12",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.16",
         },
         {
            model: "junos 5.0r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.33",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1.9",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "6.4",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "3.3",
         },
         {
            model: "web security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.1",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "vsphere replication",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.1",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.02",
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.1.3",
         },
         {
            model: "uacos c5.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet enterprise p3015 ce525a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 13.1r.3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "webex messenger service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web filter",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.6",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.152",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.6",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.10",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v20",
         },
         {
            model: "laserjet p2055 printer series ce459a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20141201",
         },
         {
            model: "color laserjet cm4730 multifunction printer cb483a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.3",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.196.4",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.203",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "dgs-1210-28",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "4.00.012",
         },
         {
            model: "ssl vpn 7.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.20",
         },
         {
            model: "laserjet enterprise m601 series ce989a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.3.0.13725",
         },
         {
            model: "infosphere master data management server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.152",
         },
         {
            model: "color laserjet printer series q7534a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "300046.80.2",
         },
         {
            model: "horizon workspace client for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.8.1",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.51",
         },
         {
            model: "rational build forge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "netiq access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "4.0",
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7893",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "watson explorer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.4",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "netiq access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "3.2",
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "command view for tape libraries",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet enterprise color mfp m575dn cd645a 2302963 436081",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "junos 12.1x45-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.2",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.4",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.0",
         },
         {
            model: "msr30-16 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fortiwifi build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "laserjet enterprise color m855 a2w77a 2302963 436076",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.4",
         },
         {
            model: "puredata system for hadoop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.01",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloudsystem chargeback",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.40",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.3",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.0",
         },
         {
            model: "aura application server sip core pb3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.3",
         },
         {
            model: "netiq access gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "0",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.2",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "security threat response manager 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "laserjet m3027 multifunction printer cc479a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "color laserjet cp6015 q3932a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.0",
         },
         {
            model: "enterprise linux long life server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5.6",
         },
         {
            model: "laserjet enterprise mfp m525f cf117a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.134.14",
         },
         {
            model: "management center",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.0",
         },
         {
            model: "ftp server",
            scope: "ne",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.3",
         },
         {
            model: "junos 11.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.0.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.4",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.7",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.4",
         },
         {
            model: "storage management initiative specification providers fo",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "57100",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "msr30-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.15",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.79",
         },
         {
            model: "puremessage for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "4.04",
         },
         {
            model: "junos 11.4r5.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cognos business intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.74",
         },
         {
            model: "laserjet enterprise p3015 ce595a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet p4515 cb514a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.03",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "sterling connect:direct",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.070.5",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.1.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.11",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "junos 11.4r12-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.2.4",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "125000",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.55",
         },
         {
            model: "officejet enterprise color c2s11a 2302963 436074",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "x555",
         },
         {
            model: "web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "symantec",
            version: "3.9.0.0",
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.12",
         },
         {
            model: "msr30-16 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "imc ead",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.31",
         },
         {
            model: "laserjet m5035 multifunction printer q7829a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "fortios b064",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.12",
         },
         {
            model: "mysql",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.20",
         },
         {
            model: "laserjet p4015 cb509a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x353071600",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "laserjet m3035 multifunction printer cb414a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.25",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27.43",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.13",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "color laserjet cp5525 ce709a 2302963 436070",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "horizon workspace client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.5",
         },
         {
            model: "web filter",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.52",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "junos 11.4r7-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "laserjet enterprise color mfp m880 a2w75a 2302963 436068",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.3",
         },
         {
            model: "system storage ts3400 tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0040",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "cit",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.40",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087520",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "scanjet enterprise document capture workstation l2719a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "85000",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web security gateway anywhere",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7.3",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "junos 12.1r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.5",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.015",
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vma san gateway g5.5.1.3",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.4.0.14619",
         },
         {
            model: "one-x mobile lite for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.173",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "system dx360m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "63911.42",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling connect:direct",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.4",
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "fortianalyzer",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.45",
         },
         {
            model: "arubaos",
            scope: "ne",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.4.1.0",
         },
         {
            model: "cognos express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "color laserjet cp6015 q3931a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.1",
         },
         {
            model: "laserjet p3005 printer series q7815a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2.190.3",
         },
         {
            model: "datafort fc-series",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "vcac",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0.1",
         },
         {
            model: "vcenter site recovery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.1",
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7200",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet printer series q5408a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43508.250.2",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xiv storage system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "281011.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "4210g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "aura application server sip core pb25",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.8",
         },
         {
            model: "junos r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "14.1",
         },
         {
            model: "laserjet enterprise m603 series ce995a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.118",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.88",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.4.3",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.95",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "nsx for multi-hypervisor",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "4.0.3",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x355079140",
         },
         {
            model: "integrated lights out manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.3",
         },
         {
            model: "utm",
            scope: "ne",
            trust: 0.3,
            vendor: "sophos",
            version: "9.203",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.3.1.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "laserjet enterprise mfp m725 cf069a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.10",
         },
         {
            model: "laserjet printer series q7784a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42408.250.2",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59000",
         },
         {
            model: "project metasploit framework",
            scope: "ne",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.3",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.86",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1.12",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.3.3",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.2",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "75000",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "junos r12",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4",
         },
         {
            model: "websphere datapower low latency appliance xm70",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.4",
         },
         {
            model: "9.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "laserjet enterprise mfp m725 cf068a 2302963 436078",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.59",
         },
         {
            model: "laserjet enterprise mfp m725 cf068a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10500",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.3",
         },
         {
            model: "laserjet enterprise color mfp m575dn cd644a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "junos os 14.1r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "color laserjet cp3505 printer series cb442a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.160.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.2",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.32",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.42",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "e-business suite 11i",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "laserjet printer series q5400a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42508.250.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.1",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087220",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.3",
         },
         {
            model: "laserjet printer series q7546a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "command view for tape libraries",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.8",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "laserjet printer series q7547a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.01",
         },
         {
            model: "rox",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "22.6",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "power ps701",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "color laserjet m651 cz256a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.012",
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.8",
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.3",
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet enterprise mfp m725 cf066a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g85a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.1",
         },
         {
            model: "aura messaging sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.3",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "software foundation python",
            scope: "eq",
            trust: 0.3,
            vendor: "python",
            version: "3.4",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "laserjet enterprise color m775 series cf304a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7000",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.119",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.2",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "laserjet printer series q5402a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "42508.250.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "msr30-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vcloud networking and security",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.2",
         },
         {
            model: "color laserjet printer series q7491a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "4510g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.5",
         },
         {
            model: "laserjet m3035 multifunction printer cb414a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "operations automation",
            scope: "eq",
            trust: 0.3,
            vendor: "parallels",
            version: "5.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.5",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.2",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.9",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.1",
         },
         {
            model: "one-x mobile lite for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.2",
         },
         {
            model: "database and middleware automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.20",
         },
         {
            model: "laserjet enterprise color mfp m575dn cd644a 2302963 436081",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "network connect",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.0.0.12875",
         },
         {
            model: "power system s822",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "network connect 8.0r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21-21",
         },
         {
            model: "junos pulse for android",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.22",
         },
         {
            model: "system x3550m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79441.42",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.40",
         },
         {
            model: "airwave",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "7.2.2",
         },
         {
            model: "vfabric application director",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.2",
         },
         {
            model: "color laserjet printer series q5981a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "380046.80.8",
         },
         {
            model: "enterprise virtualization",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "junos 11.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2.6",
         },
         {
            model: "junos 10.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "proxysg sgos",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.4.4",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.5",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.2",
         },
         {
            model: "websphere datapower xml accelerator xa35",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.8",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cz195a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "integrity sd2 cb900s i2 and i4 server",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.7.98",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.010",
         },
         {
            model: "flex system p260",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.4",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7.0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.37",
         },
         {
            model: "pulse desktop 4.0r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laserjet p4015 cb510a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.8",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "ive os 7.4r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "puredata system for hadoop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.00",
         },
         {
            model: "utm manager",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "4.1",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.29",
         },
         {
            model: "laserjet printer series q7699a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.5.5",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.23",
         },
         {
            model: "m220 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.03",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77009.7",
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0.2",
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "unified agent",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58300",
         },
         {
            model: "jetdirect 695n eio card j8024a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "41.16",
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.3.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "laserjet printer series q5410a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "43508.250.2",
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data recovery",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.0.3",
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.9.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.0",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x350073830",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.1.0",
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79120",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.21",
         },
         {
            model: "cms r16",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "color laserjet m651 cz256a 2302963 436073",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.121",
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.1",
         },
         {
            model: "color laserjet printer series q7494a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "470046.230.6",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "119000",
         },
         {
            model: "secure analytics 2014.2r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "power ps704 blade",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7891-74x)0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.120",
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "laserjet enterprise mfp m725 cf067a 2302963 436078",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "laserjet enterprise p3015 ce525a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.186.1",
         },
         {
            model: "nsx for vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0.4",
         },
         {
            model: "junos 13.1r3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.24",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7101",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.157.3",
         },
         {
            model: "laserjet cm3530 multifunction printer cc519a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "laserjet enterprise m4555 mfp ce738a 2302963 436064",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.48",
         },
         {
            model: "horizon workspace",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.5",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.9",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp series",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "laserjet enterprise p3015 ce527a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.186.1",
         },
         {
            model: "laserjet enterprise p3015 ce526a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.186.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "watson explorer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.4",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g86a 2303714 233000041",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system storage ts3400 tape library",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "0042",
         },
         {
            model: "email security gateway anywhere",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.1",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.143",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "laserjet m3035 multifunction printer cb415a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "laserjet cm3530 multifunction printer cc520a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "messagesight server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "ive os 8.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 11.4r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr93x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.47",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.2",
         },
         {
            model: "color laserjet multifunction printer series q7520a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "airwave",
            scope: "ne",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "7.7.12",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.0",
         },
         {
            model: "flashsystem 9846-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "9250c digital sender cb472a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.293.1",
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.31",
         },
         {
            model: "laserjet enterprise color mfp m880 d7p71a 2302963 436068",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "800",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.8",
         },
         {
            model: "netezza diagnostic tools",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0",
         },
         {
            model: "laserjet m4345 multifunction printer cb427a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.21",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.1.68.7",
         },
         {
            model: "elan",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "8.2",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "laserjet enterprise color m855 a2w77a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.81",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2.15",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.2",
         },
         {
            model: "dgs-1500-28",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "2.51.005",
         },
         {
            model: "3par service processor sp-4.2.0.ga-29.p003",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s7-1500",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.6",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "virtual tape library",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.70",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "cloud service automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.01",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "color laserjet multifunction printer series q7518a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.8",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "laserjet printer series q7544a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52008.241",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "laserjet enterprise m4555 mfp ce502a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos space 13.1p1.14",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dgs-1210-20",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "4.00.041",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "icewall sso dfw certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "laserjet enterprise m603 series ce996a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.9",
         },
         {
            model: "cit",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.2",
         },
         {
            model: "color laserjet cp6015 q3932a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.53",
         },
         {
            model: "horizon workspace client for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.5",
         },
         {
            model: "communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "via for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "2.0.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "color laserjet printer series q5983a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "380046.80.8",
         },
         {
            model: "junos 11.4r9-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sbr enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.10",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.23",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "puremessage for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "4.05",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.19",
         },
         {
            model: "tivoli storage productivity center fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.14",
         },
         {
            model: "sterling connect:enterprise for unix ifix03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.3",
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7300",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "officejet enterprise color mfp b5l04a 2302963 436066",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "x585",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.01",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.5",
         },
         {
            model: "via for linux",
            scope: "ne",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "2.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.17",
         },
         {
            model: "pulse desktop 5.0r3.1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.3.61.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.115",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.1.2",
         },
         {
            model: "junos 5.0r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "fortios build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jetdirect 620n eio card j7934g",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "29.26",
         },
         {
            model: "junos 10.0s18",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "scanjet enterprise document capture workstation l2719a 2302963 436065",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8500",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.33",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.12",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.4",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.45",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.0.2",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.31",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8724",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.78",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "color laserjet flow m680 ca251a 2302963 436072",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x365079150",
         },
         {
            model: "exalogic",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "x3-22.0.6.2.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.4",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.10",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 10.4r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.15",
         },
         {
            model: "web security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.3",
         },
         {
            model: "config manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.6",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.3",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.6",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "ssl vpn 8.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.4",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4.0.15",
         },
         {
            model: "cp1543-1",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.1.25",
         },
         {
            model: "laserjet m9050 multifunction printer cc395a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "51.256.1",
         },
         {
            model: "ive os 7.4r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.41",
         },
         {
            model: "laserjet enterprise color m551 series cf081a 2302963 436083",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "msr30 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "color laserjet enterprise m750 d3l10a 2302963 436077",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "color laserjet cp3505 printer series cb443a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.160.2",
         },
         {
            model: "laserjet enterprise m601 series ce990a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "proxysg sgos",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.2.15.6",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.54",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087330",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.30",
         },
         {
            model: "utm",
            scope: "ne",
            trust: 0.3,
            vendor: "sophos",
            version: "9.113",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.9",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "color laserjet printer series q7536a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "300046.80.2",
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.2.0",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jsa 2014.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.2",
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.177",
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.35",
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.1",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x571431.43",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "hsr6602 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.18",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "laserjet enterprise color m775 series cc524a 2302963 436079",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.23",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v39.7",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.6",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.21",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.32",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "datafort common criteria fc-series",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "junos 11.4r7-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.20",
         },
         {
            model: "pulse desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.38",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "ovf tool",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.5.1",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "message networking sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.00",
         },
         {
            model: "chargeback manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5",
         },
         {
            model: "web security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.7.3",
         },
         {
            model: "laserjet enterprise flow m830z mfp cf367a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "officejet enterprise color mfp b5l07a 2302963 436066",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "x585",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "power express",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7500",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.5.0.15",
         },
         {
            model: "junos 12.1x45-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet m4345 multifunction printer cb428a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.8",
         },
         {
            model: "junos 13.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "fortimail build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.3281",
         },
         {
            model: "color laserjet enterprise m750 d3l08a 2302963 436077",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "laserjet pro m401a/d/dn/dnw/dw/n cf278a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "40020150212",
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "web security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.40",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.78",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.65",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "28.0.1500.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.5",
         },
         {
            model: "vma",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.11",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.31",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.8",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.6.3",
         },
         {
            model: "proxyav",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5.21",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.13",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.39",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.8",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.12",
         },
         {
            model: "color laserjet enterprise m750 d3l09a 2302963 436077",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "web security",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.3",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.33",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "system x3400m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73781.42",
         },
         {
            model: "strm/jsa 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.171",
         },
         {
            model: "vcenter support assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5.1",
         },
         {
            model: "laserjet p4015 cb511a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "msr50-g2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "exalogic",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "x4-22.0.6.2.0",
         },
         {
            model: "system x3550m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79461.42",
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.156",
         },
         {
            model: "laserjet cm3530 multifunction printer cc520a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "53.236.1",
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "4.3.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.58",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "11.16",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0",
         },
         {
            model: "jetdirect 690n eio card j8007a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "41.16",
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.3",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "flex system p24l",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "ovf tool",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.0.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.17",
         },
         {
            model: "command view server based management",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "10.3.3",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.2.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.18",
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.14",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.30",
         },
         {
            model: "algo one",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7.1",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.3.1",
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "color laserjet cm6030 multifunction printer ce665a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "vma san gateway g5.5.1.1",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "laserjet enterprise m603 series ce996a 2302963 436082",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "600",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos space 13.3r4.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.4.4",
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "xenclient enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.1.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3690x571481.43",
         },
         {
            model: "fortivoiceos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "imc uam",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "integrated management module ii",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.86",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.24",
         },
         {
            model: "system x3650m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79491.42",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.213",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "intelligent management center",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "laserjet enterprise m602 series ce993a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.02",
         },
         {
            model: "vsphere cli",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "junos 10.4r13",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet enterprise p3015 ce528a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.54",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "fusion",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "22.5",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x2.0.10",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 13.1r4-s2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "color laserjet enterprise m750 d3l08a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "system x3250m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "42521.42",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "20500",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.112",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.1.15",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.32",
         },
         {
            model: "ape",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "2.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.43",
         },
         {
            model: "laserjet m4345 multifunction printer cb426a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr20-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "aura application server sip core pb26",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.99",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.3",
         },
         {
            model: "websphere message broker",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0",
         },
         {
            model: "bladesystem c-class virtual connect",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.10",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.28",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "junos 12.1x45-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.178",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5",
         },
         {
            model: "flex system p460 compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-42x)0",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.2.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.76",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "horizon view client",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "4.0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "proxysgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.4.6.1",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.21",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.8.11",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "color laserjet enterprise cp4025 cc490a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.164.1",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v29.7",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.131.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "laserjet printer series q3723a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9040/90508.260.3",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.06",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "3par service processor sp-4.3.0.ga-17.p000",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "color laserjet cp6015 q3935a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.27",
         },
         {
            model: "sbr carrier 7.5.0-r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet enterprise m603 series ce994a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "junos 12.2r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.1.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.19",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.21",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.4",
         },
         {
            model: "laserjet enterprise m4555 mfp ce504a 2302963 436064",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 10.4r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.60",
         },
         {
            model: "digital sender 9200c q5916a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "9.271.3",
         },
         {
            model: "laserjet m3035 multifunction printer cc477a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "48.306.1",
         },
         {
            model: "system x3620m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73761.42",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3600v20",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.2",
         },
         {
            model: "laserjet p3005 printer series q7812a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "2.190.3",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "laserjet enterprise color flow mfp m575c cd646a 2302963 436081",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.55",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.90",
         },
         {
            model: "laserjet p4515 cb514a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.203.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.16",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "2.0.3",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "msr4000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "system x3400m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "78371.42",
         },
         {
            model: "junos 12.2r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "laserjet p4014 cb506a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "laserjet enterprise mfp m525f cf116a 2302963 436069",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "500",
         },
         {
            model: "puremessage for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "5.5.4",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "financial services lending and leasing",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "14.1",
         },
         {
            model: "flex system p24l compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "email security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "eucalyptus",
            scope: "eq",
            trust: 0.3,
            vendor: "eucalyptus",
            version: "3.4.2",
         },
         {
            model: "3par service processor sp-4.1.0.ga-97.p011",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.25",
         },
         {
            model: "3par service processor sp-4.1.0.ga-97.p010",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.20",
         },
         {
            model: "cloudsystem foundation",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "database and middleware automation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.01",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.30",
         },
         {
            model: "jetdirect 635n eio card j7961g",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "41.16",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.84",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "vdi-in-a-box",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "5.4.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.3",
         },
         {
            model: "junos 13.3r2-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.36",
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "color laserjet multifunction printer series q7517a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "400046.380.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "flex system p460",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "(7895-42x)0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "junos pulse for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.01",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.18",
         },
         {
            model: "websphere datapower xml security gateway xs40",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.05",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "tivoli network manager ip edition fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.94",
         },
         {
            model: "laserjet enterprise mfp m630 series b3g86a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.8",
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "color laserjet m651 cz257a 2302963 436073",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.21",
         },
         {
            model: "color laserjet cm6040 multifunction printer q3938a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "52.256.1",
         },
         {
            model: "netiq sslvpn server",
            scope: "eq",
            trust: 0.3,
            vendor: "novell",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.45",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4",
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.77",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "color laserjet cp4005 printer series cb503a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "46.230.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.18",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.75",
         },
         {
            model: "sparc m10-1",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "0",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.5",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "laserjet enterprise m603 series ce995a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.44",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "laserjet enterprise mfp m630 series j7x28a 2303714 233000041",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.166",
         },
         {
            model: "junos 11.4r3.7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "junos 13.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.52",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "dgs-1500.20",
            scope: "eq",
            trust: 0.3,
            vendor: "d link",
            version: "2.51.005",
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "laserjet enterprise m602 series ce992a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6000",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45-",
         },
         {
            model: "update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "laserjet p2055 printer series ce457a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "20141201",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.5",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "idol image server",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.87",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.35",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x375087520",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.36",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.47",
         },
         {
            model: "itbm standard",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.0.1",
         },
         {
            model: "fortigate",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "mcp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "color laserjet flow m680 cz250a 2302963 436072",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "websphere cast iron cloud integration",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.32",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.6",
         },
         {
            model: "host checker",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "junos 12.2r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21-20",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.38",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3.1",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.0.6",
         },
         {
            model: "system x3400m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73791.42",
         },
         {
            model: "laserjet enterprise color m551 series cf083a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5000",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "winscp",
            scope: "eq",
            trust: 0.3,
            vendor: "winscp",
            version: "5.1.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.35",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.97",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.34",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.22",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "4.0.14",
         },
         {
            model: "laserjet enterprise color mfp m880 d7p71a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "color laserjet cp3525 cc470a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.183.1",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.11",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "laserjet p4014 cb512a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.145",
         },
         {
            model: "project openssl 0.9.8za",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "cloudplatform",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.3.0.1",
         },
         {
            model: "data ontap storage management initiative specification a",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "35.0",
         },
         {
            model: "aura application server sip core pb16",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "idp series 5.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.00",
         },
         {
            model: "cloudplatform",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "4.2.1",
         },
         {
            model: "puremessage for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "sophos",
            version: "5.5.5",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "10.1-122.17",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.5",
         },
         {
            model: "fortimail build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.6170",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "1.9.4",
         },
         {
            model: "junos 10.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "clearpass",
            scope: "eq",
            trust: 0.3,
            vendor: "arubanetworks",
            version: "6.3.2",
         },
         {
            model: "integrated management module ii",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.30",
         },
         {
            model: "vfabric web server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.3.4",
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.1",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "laserjet enterprise m712 series cf238a 2302963 436080",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "700",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "unified agent",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.35",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "enterprise linux desktop workstation client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.05",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.0.7",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.33",
         },
         {
            model: "sylpheed",
            scope: "eq",
            trust: 0.3,
            vendor: "sylpheed",
            version: "0.9.5",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "web security gateway anywhere",
            scope: "eq",
            trust: 0.3,
            vendor: "websense",
            version: "7.8.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "junos space 13.3r1.9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "laserjet p4515 cb517a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.213.1",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "9.3-beta1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "software foundation python",
            scope: "eq",
            trust: 0.3,
            vendor: "python",
            version: "2.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.98",
         },
         {
            model: "laserjet enterprise color mfp m880 a2w75a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8000",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1",
         },
         {
            model: "horizon workspace server gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "1.5",
         },
         {
            model: "laserjet enterprise p3015 ce595a",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.186.1",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "BID",
            id: "67899",
         },
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "128345",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2014-0224",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-0224",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "ADJACENT NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "LOW",
                  baseScore: 6.4,
                  collateralDamagePotential: "HIGH",
                  confidentialityImpact: "COMPLETE",
                  confidentialityRequirement: "HIGH",
                  enviromentalScore: 8.1,
                  exploitability: "PROOF-OF-CONCEPT",
                  exploitabilityScore: 5.5,
                  id: "CVE-2014-0224",
                  impactScore: 7.8,
                  integrityImpact: "PARTIAL",
                  integrityRequirement: "MEDIUM",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  remediationLevel: "OFFICIAL FIX",
                  reportConfidence: "CONFIRMED",
                  severity: "MEDIUM",
                  targetDistribution: "HIGH",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vector_string: "AV:A/AC:M/Au:N/C:C/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  id: "CVE-2014-0224",
                  impactScore: 5.2,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0224",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-0224",
                  trust: 0.8,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-0224",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability. OpenSSL is vulnerable to a man-in-the-middle attack. \nSuccessfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. \n\nHP IceWall SSO Dfw and MCRP\n\nIf possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to\nuse SSL/TLS for back-end web server connection. \n\nHP IceWall SSO Dfw Certd\n\nIf possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS\non any connection with LDAP server. \n\nNote: The HP IceWall product is only available in Japan. \nPlease note that version 7.3.3 of HP Insight Control server migration is\nincluded on the HP Insight Management 7.3 Update 2 DVD. \n\nHP has provided the installation binaries for download from the following web\nsite by using the Receive for free option:\n\nhttp://h18013.www1.hp.com/products/servers/management/fpdownload.html\n\nCustomers using HP Insight Control server migration v7.2.2 must first upgrade\nfrom v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then\nupgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD. \n\nCustomers running HP Insight Control server migration v7.3, v7.3.1, or\nv7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to\ncomplete the upgrade. \n\nFor more information on the upgrade process, please refer to the HP Insight\nManagement Installation and Upgrade Guide and Release notes, which are\navailable at the following location:\n\nhttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind\nex.aspx?cat=insightmanagement\n\nNOTE: The upgrade paths described above update the entire HP Insight Control\nsoftware stack. To upgrade HP Insight Control server migration only, complete\nthe following steps:\n\nCopy \"hpsmp.exe\" to the local machine from the HP Insight Management v7.3.0\nUpdate 2 DVD ISO. Create batch file with the following commands:\n@echo off\nhpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch\nCopy the batch file to the folder where \"hpsmp.exe\" normally resides on the\ntarget system. \nDouble click on the batch file. \nThe HP Insight Control server migration installation starts in a command\nprompt. \nThe command prompt closes when the installation finishes. \nAfter the installation completes it creates a log file (ICmigr.log) and an\noutput file (ICmigroutput.xml) on the target system. \nDo not close or click on the command prompt while the process is completing. \nDo not run the command prompt in the background. \n\nHISTORY\nVersion:1 (rev.1) - 23 July 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. The\nupdates are available from https://h20392.www2.hp.com/portal/swdepot/displayP\nroductInfo.do?productNumber=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n A.00.09.08za.001_HP-UX_B.11.11_32+64.depot\n\nB.11.23 (11i v2)\n A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08za or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. ============================================================================\nUbuntu Security Notice USN-2232-3\nJune 23, 2014\n\nopenssl regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 13.10\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nUSN-2232-1 introduced a regression in OpenSSL. The upstream fix for\nCVE-2014-0224 caused a regression for certain applications that use\nrenegotiation, such as PostgreSQL. This update fixes the problem. \n\nOriginal advisory details:\n\n J=C3=BCri Aedla discovered that OpenSSL incorrectly handled invalid DTLS\n fragments. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\n Ubuntu 14.04 LTS. (CVE-2014-0195)\n  Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\n remote attacker could use this issue to cause OpenSSL to crash, resulting\n in a denial of service. (CVE-2014-0221)\n  KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\n handshakes. \n (CVE-2014-0224)\n  Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled\n anonymous ECDH ciphersuites. A remote attacker could use this issue to\n cause OpenSSL to crash, resulting in a denial of service. This issue only\n affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. \n (CVE-2014-3470)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.4\n\nUbuntu 13.10:\n  libssl1.0.0                     1.0.1e-3ubuntu1.6\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.16\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.19\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2232-3\n  http://www.ubuntu.com/usn/usn-2232-1\n  https://launchpad.net/bugs/1332643\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16\n  https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04347622\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04347622\nVersion: 1\n\nHPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network\nProducts including H3C and 3COM Routers and Switches running OpenSSL, Remote\nDenial of Service (DoS), Code Execution, Unauthorized Access, Modification or\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-06-20\nLast Updated: 2014-06-20\n\nPotential Security Impact: Remote Denial of Service (DoS), code execution,\nunauthorized access, modification of information, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Intelligent\nManagement Center (iMC), HP Network Products including 3COM and H3C routers\nand switches running OpenSSL. The vulnerabilities could be exploited remotely\nto create a Denial of Service (DoS), execute code, allow unauthorized access,\nmodify or disclose information. \n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information\nCVE-2014-0198 Remote Unauthorized Access (only iMC impacted)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nSSRT101561\nNote: All products listed are impacted by CVE-2014-0224 . iMC is also\nimpacted by CVE-2014-0198 and CVE-2010-5298\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nOn June 5th 2014, OpenSSL.org issued an advisory with several CVE\nvulnerabilities. HP Networking is working to release fixes for these\nvulnerabilities that impact the products in the table below. As fixed\nsoftware is made available, this security bulletin will be updated to show\nthe fixed versions. Until the software fixes are available, HP Networking is\nproviding the following information including possible workarounds to\nmitigate the risks of these vulnerabilities. \n\nDescription\n\nThe most serious issue reported is CVE-2014-0224 and it is the one discussed\nhere. To take advantage CVE-2014-0224, an attacker must:\n\nbe in between the OpenSSL client and OpenSSL server. \nbe capable of intercepting and modifying packets between the OpenSSL client\nand OpenSSL server in real time. \n\nWorkarounds\n\nHP Networking equipment is typically deployed inside firewalls and access to\nmanagement interfaces and other protocols is more tightly controlled than in\npublic environments. This deployment and security restrictions help to reduce\nthe possibility of an attacker being able to intercept both OpenSSL client\nand OpenSSL server traffic. \n\nFollowing the guidelines in the Hardening Comware-based devices can help to\nfurther reduce man-in-the-middle opportunities:\n\nhttp://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536\n920\n\nFor an HP Networking device acting as an OpenSSL Server, using a patched\nOpenSSL client or non-OpenSSL client eliminates the risk. As an example, most\nmodern web browsers do not use the OpenSSL client and the sessions between\nthe HP Networking OpenSSL server and the non-OpenSSL client are not at risk\nfor this attack. For HP Networking Equipment that is using an OpenSSL client,\npatching the OpenSSL server will eliminate the risk of this attack. \n\nProtocol Notes\n\nThe following details the protocols that use OpenSSL in Comware v5 and\nComware v7:\n\nComware V7:\n\nServer:\n\nFIPS/HTTPS/Load Balancing/Session Initiation Protocol\n\nClient:\n\nLoad Balancing/OpenFlow/Session Initiation Protocol/State Machine Based\nAnti-Spoofing/Dynamic DNS\n\nComware V5:\n\nServer:\n\nCAPWAP/EAP/SSLVPN\n\nClient:\n\nDynamic DNS\n\nFamily\n Fixed Version\n HP Branded Products Impacted\n H3C Branded Products Impacted\n 3Com Branded Products Impacted\n\n12900 Switch Series\n Fix in progress\nuse mitigations\n JG619A HP FF 12910 Switch AC Chassis\nJG621A HP FF 12910 Main Processing Unit\nJG632A HP FF 12916 Switch AC Chassis\nJG634A HP FF 12916 Main Processing Unit\n\n12500\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJC808A HP 12500 TAA Main Processing Unit\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n12500 (Comware v7)\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJG497A HP 12500 MPU w/Comware V7 OS\nJG782A HP FF 12508E AC Switch Chassis\nJG783A HP FF 12508E DC Switch Chassis\nJG784A HP FF 12518E AC Switch Chassis\nJG785A HP FF 12518E DC Switch Chassis\nJG802A HP FF 12500E MPU\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n11900 Switch Series\n Fix in progress\nuse mitigations\n JG608A HP FF 11908-V Switch Chassis\nJG609A HP FF 11900 Main Processing Unit\n\n10500 Switch Series (Comware v5)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC614A HP 10500 Main Processing Unit\nJC748A HP 10512 Switch Chassis\nJG375A HP 10500 TAA Main Processing Unit\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\n\n10500 Switch Series (Comware v7)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC748A HP 10512 Switch Chassis\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\nJG496A HP 10500 Type A MPU w/Comware v7 OS\n\n9500E\n Fix in progress\nuse mitigations\n JC124A HP A9508 Switch Chassis\nJC124B HP 9505 Switch Chassis\nJC125A HP A9512 Switch Chassis\nJC125B HP 9512 Switch Chassis\nJC474A HP A9508-V Switch Chassis\nJC474B HP 9508-V Switch Chassis\n H3C S9505E Routing-Switch Chassis (0235A0G6)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9512E Routing-Switch Chassis (0235A0G7)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9505E Chassis w/ Fans (0235A38P)\nH3C S9512E Chassis w/ Fans (0235A38R)\n\nRouter 8800\n Fix in progress\nuse mitigations\n JC147A HP A8802 Router Chassis\nJC147B HP 8802 Router Chassis\nJC148A HP A8805 Router Chassis\nJC148B HP 8805 Router Chassis\nJC149A HP A8808 Router Chassis\nJC149B HP 8808 Router Chassis\nJC150A HP A8812 Router Chassis\nJC150B HP 8812 Router Chassis\nJC141A HP 8802 Main Control Unit Module\nJC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod\nJC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod\n H3C SR8805 10G Core Router Chassis (0235A0G8)\nH3C SR8808 10G Core Router Chassis (0235A0G9)\nH3C SR8812 10G Core Router Chassis (0235A0GA)\nH3C SR8802 10G Core Router Chassis (0235A0GC)\nH3C SR8802 10G Core Router Chassis (0235A31B)\nH3C SR8805 10G Core Router Chassis (0235A31C)\nH3C SR8808 10G Core Router Chassis (0235A31D)\nH3C SR8812 10G Core Router Chassis (0235A31E)\n\n7500 Switch Series\n Fix in progress\nuse mitigations\n JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T\nJC697A HP A7502 TAA Main Processing Unit\nJC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE\nJC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE\nJC700A HP A7500 384 Gbps TAA Fabric / MPU\nJC701A HP A7510 768 Gbps TAA Fabric / MPU\nJD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports\nJD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports\nJD194A HP 384 Gbps Fabric A7500 Module\nJD194B HP 7500 384Gbps Fabric Module\nJD195A HP 7500 384Gbps Advanced Fabric Module\nJD196A HP 7502 Fabric Module\nJD220A HP 7500 768Gbps Fabric Module\nJD238A HP A7510 Switch Chassis\nJD238B HP 7510 Switch Chassis\nJD239A HP A7506 Switch Chassis\nJD239B HP 7506 Switch Chassis\nJD240A HP A7503 Switch Chassis\nJD240B HP 7503 Switch Chassis\nJD241A HP A7506 Vertical Switch Chassis\nJD241B HP 7506-V Switch Chassis\nJD242A HP A7502 Switch Chassis\nJD242B HP 7502 Switch Chassis\nJD243A HP A7503 Switch Chassis w/1 Fabric Slot\nJD243B HP 7503-S Switch Chassis w/1 Fabric Slot\n H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)\nH3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)\nH3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)\nH3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)\nH3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)\nH3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)\nH3C S7502E Chassis w/ fans (0235A29A)\nH3C S7503E Chassis w/ fans (0235A27R)\nH3C S7503E-S Chassis w/ fans (0235A33R)\nH3C S7506E Chassis w/ fans (0235A27Q)\nH3C S7506E-V Chassis w/ fans (0235A27S)\n\nHSR6800\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6800 Russian Version\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6602\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nHSR6602 Russian Version\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nA6600\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\nA6600 Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU\nJG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n5920 Switch Series\n Fix in progress\nuse mitigations\n JG296A HP 5920AF-24XG Switch\nJG555A HP 5920AF-24XG TAA Switch\n\n5900 Switch Series\n Fix in progress\nuse mitigations\n JC772A HP 5900AF-48XG-4QSFP+ Switch\nJG336A HP 5900AF-48XGT-4QSFP+ Switch\nJG510A HP 5900AF-48G-4XG-2QSFP+ Switch\nJG554A HP 5900AF-48XG-4QSFP+ TAA Switch\nJG838A HP FF 5900CP-48XG-4QSFP+ Switch\n\n5900 Virtual Switch\n Fix in progress\nuse mitigations\n JG814AAE HP Virtual Switch 5900v VMware E-LTU\nJG815AAE HP VSO SW for 5900v VMware E-LTU\n\n5830 Switch Series\n Fix in progress\nuse mitigations\n JC691A HP A5830AF-48G Switch w/1 Interface Slot\nJC694A HP A5830AF-96G Switch\nJG316A HP 5830AF-48G TAA Switch w/1 Intf Slot\nJG374A HP 5830AF-96G TAA Switch\n\n5820 Switch Series\n Fix in progress\nuse mitigations\n JC102A HP 5820-24XG-SFP+ Switch\nJC106A HP 5820-14XG-SFP+ Switch with 2 Slots\nJG219A HP 5820AF-24XG Switch\nJG243A HP 5820-24XG-SFP+ TAA-compliant Switch\nJG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots\n H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media\nmodules Plus OSM (0235A37L)\nH3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T\n(RJ45) (0235A370)\n\n5800 Switch Series\n Fix in progress\nuse mitigations\n JC099A HP 5800-24G-PoE Switch\nJC100A HP 5800-24G Switch\nJC101A HP 5800-48G Switch with 2 Slots\nJC103A HP 5800-24G-SFP Switch\nJC104A HP 5800-48G-PoE Switch\nJC105A HP 5800-48G Switch\nJG225A HP 5800AF-48G Switch\nJG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots\nJG254A HP 5800-24G-PoE+ TAA-compliant Switch\nJG255A HP 5800-24G TAA-compliant Switch\nJG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt\nJG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot\nJG258A HP 5800-48G TAA Switch w 1 Intf Slot\n H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot\n(0235A36U)\nH3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X\n(SFP Plus ) Plus 1 media module PoE (0235A36S)\nH3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus\nmedia module (no power) (0235A374)\nH3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus\n) Plus media module (0235A379)\nH3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module\n(0235A378)\nH3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM\n(0235A36W)\n\n5500 HI Switch Series\n Fix in progress\nuse mitigations\n JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch\nJG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch\nJG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt\nJG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt\nJG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt\nJG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt\nJG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt\nJG681A HP 5500-24G-SFP HI TAA Swch w/2Slt\n\n5500 EI Switch Series\n Fix in progress\nuse mitigations\n JD373A HP 5500-24G DC EI Switch\nJD374A HP 5500-24G-SFP EI Switch\nJD375A HP 5500-48G EI Switch\nJD376A HP 5500-48G-PoE EI Switch\nJD377A HP 5500-24G EI Switch\nJD378A HP 5500-24G-PoE EI Switch\nJD379A HP 5500-24G-SFP DC EI Switch\nJG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts\nJG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts\nJG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts\nJG250A HP 5500-24G EI TAA Switch w 2 Intf Slts\nJG251A HP 5500-48G EI TAA Switch w 2 Intf Slts\nJG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts\nJG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts\n H3C S5500-28C-EI Ethernet Switch (0235A253)\nH3C S5500-28F-EI Eth Switch AC Single (0235A24U)\nH3C S5500-52C-EI Ethernet Switch (0235A24X)\nH3C S5500-28C-EI-DC Ethernet Switch (0235A24S)\nH3C S5500-28C-PWR-EI Ethernet Switch (0235A255)\nH3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)\nH3C S5500-52C-PWR-EI Ethernet Switch (0235A251)\n\n5500 SI Switch Series\n Fix in progress\nuse mitigations\n JD369A HP 5500-24G SI Switch\nJD370A HP 5500-48G SI Switch\nJD371A HP 5500-24G-PoE SI Switch\nJD372A HP 5500-48G-PoE SI Switch\nJG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts\nJG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts\n H3C S5500-28C-SI Ethernet Switch (0235A04U)\nH3C S5500-52C-SI Ethernet Switch (0235A04V)\nH3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)\nH3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)\n\n5120 EI Switch Series\n Fix in progress\nuse mitigations\n JE066A HP 5120-24G EI Switch\nJE067A HP 5120-48G EI Switch\nJE068A HP 5120-24G EI Switch with 2 Slots\nJE069A HP 5120-48G EI Switch with 2 Slots\nJE070A HP 5120-24G-PoE EI Switch with 2 Slots\nJE071A HP 5120-48G-PoE EI Switch with 2 Slots\nJG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts\nJG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts\nJG245A HP 5120-24G EI TAA Switch w 2 Intf Slts\nJG246A HP 5120-48G EI TAA Switch w 2 Intf Slts\nJG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts\nJG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts\n H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)\nH3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)\nH3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)\nH3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)\nH3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)\nH3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)\n\n5120 SI switch Series\n Fix in progress\nuse mitigations\n JE072A HP 5120-48G SI Switch\nJE073A HP 5120-16G SI Switch\nJE074A HP 5120-24G SI Switch\nJG091A HP 5120-24G-PoE+ (370W) SI Switch\nJG092A HP 5120-24G-PoE+ (170W) SI Switch\n H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)\nH3C S5120-20P-SI L2\n16GE Plus 4SFP (0235A42B)\nH3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)\nH3C S5120-28P-HPWR-SI (0235A0E5)\nH3C S5120-28P-PWR-SI (0235A0E3)\n\n4800 G Switch Series\n Fix in progress\nuse mitigations\n JD007A HP 4800-24G Switch\nJD008A HP 4800-24G-PoE Switch\nJD009A HP 4800-24G-SFP Switch\nJD010A HP 4800-48G Switch\nJD011A HP 4800-48G-PoE Switch\n\n 3Com Switch 4800G 24-Port (3CRS48G-24-91)\n3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)\n3Com Switch 4800G 48-Port (3CRS48G-48-91)\n3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)\n3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)\n\n4510G Switch Series\n Fix in progress\nuse mitigations\n JF428A HP 4510-48G Switch\nJF847A HP 4510-24G Switch\n\n 3Com Switch 4510G 48 Port (3CRS45G-48-91)\n3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)\n3Com Switch E4510-24G (3CRS45G-24-91)\n\n4210G Switch Series\n Fix in progress\nuse mitigations\n JF844A HP 4210-24G Switch\nJF845A HP 4210-48G Switch\nJF846A HP 4210-24G-PoE Switch\n\n 3Com Switch 4210-24G (3CRS42G-24-91)\n3Com Switch 4210-48G (3CRS42G-48-91)\n3Com Switch E4210-24G-PoE (3CRS42G-24P-91)\n\n3610 Switch Series\n Fix in progress\nuse mitigations\n JD335A HP 3610-48 Switch\nJD336A HP 3610-24-4G-SFP Switch\nJD337A HP 3610-24-2G-2G-SFP Switch\nJD338A HP 3610-24-SFP Switch\n H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)\nH3C S3610-28P - model LS-3610-28P-OVS (0235A22D)\nH3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)\nH3C S3610-28F - model LS-3610-28F-OVS (0235A22F)\n\n3600 V2 Switch Series\n Fix in progress\nuse mitigations\n JG299A HP 3600-24 v2 EI Switch\nJG300A HP 3600-48 v2 EI Switch\nJG301A HP 3600-24-PoE+ v2 EI Switch\nJG301B HP 3600-24-PoE+ v2 EI Switch\nJG302A HP 3600-48-PoE+ v2 EI Switch\nJG302B HP 3600-48-PoE+ v2 EI Switch\nJG303A HP 3600-24-SFP v2 EI Switch\nJG304A HP 3600-24 v2 SI Switch\nJG305A HP 3600-48 v2 SI Switch\nJG306A HP 3600-24-PoE+ v2 SI Switch\nJG306B HP 3600-24-PoE+ v2 SI Switch\nJG307A HP 3600-48-PoE+ v2 SI Switch\nJG307B HP 3600-48-PoE+ v2 SI Switch\n\n3100V2\n Fix in progress\nuse mitigations\n JD313B HP 3100-24-PoE v2 EI Switch\nJD318B HP 3100-8 v2 EI Switch\nJD319B HP 3100-16 v2 EI Switch\nJD320B HP 3100-24 v2 EI Switch\nJG221A HP 3100-8 v2 SI Switch\nJG222A HP 3100-16 v2 SI Switch\nJG223A HP 3100-24 v2 SI Switch\n\n3100V2-48\n Fix in progress\nuse mitigations\n JG315A HP 3100-48 v2 Switch\n\n1910\n Fix in progress\nuse mitigations\n JE005A HP 1910-16G Switch\nJE006A HP 1910-24G Switch\nJE007A HP 1910-24G-PoE (365W) Switch\nJE008A HP 1910-24G-PoE(170W) Switch\nJE009A HP 1910-48G Switch\nJG348A HP 1910-8G Switch\nJG349A HP 1910-8G-PoE+ (65W) Switch\nJG350A HP 1910-8G-PoE+ (180W) Switch\n 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293)\n3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093)\n3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893)\n3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93)\n3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)\n\n1810v1 P2\n Fix in progress\nuse mitigations\n J9449A HP 1810-8G Switch\nJ9450A HP 1810-24G Switch\n\n1810v1 PK\n Fix in progress\nuse mitigations\n J9660A HP 1810-48G Switch\n\nMSR20\n Fix in progress\nuse mitigations\n JD432A HP A-MSR20-21 Multi-Service Router\nJD662A HP MSR20-20 Multi-Service Router\nJD663A HP MSR20-21 Multi-Service Router\nJD663B HP MSR20-21 Router\nJD664A HP MSR20-40 Multi-Service Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\nH3C MSR 20-20 (0235A19H)\nH3C MSR 20-21 (0235A325)\nH3C MSR 20-40 (0235A19K)\nH3C MSR-20-21 Router (0235A19J)\n\nMSR20-1X\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJD667A HP MSR20-15 IW Multi-Service Router\nJD668A HP MSR20-13 Multi-Service Router\nJD669A HP MSR20-13 W Multi-Service Router\nJD670A HP MSR20-15 A Multi-Service Router\nJD671A HP MSR20-15 AW Multi-Service Router\nJD672A HP MSR20-15 I Multi-Service Router\nJD673A HP MSR20-11 Multi-Service Router\nJD674A HP MSR20-12 Multi-Service Router\nJD675A HP MSR20-12 W Multi-Service Router\nJD676A HP MSR20-12 T1 Multi-Service Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\nJG209A HP MSR20-12-T-W Router (NA)\nJG210A HP MSR20-13-W Router (NA)\n H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\nH3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-11 (0235A31V)\nH3C MSR 20-12 (0235A32E)\nH3C MSR 20-12 T1 (0235A32B)\nH3C MSR 20-13 (0235A31W)\nH3C MSR 20-13 W (0235A31X)\nH3C MSR 20-15 A (0235A31Q)\nH3C MSR 20-15 A W (0235A31R)\nH3C MSR 20-15 I (0235A31N)\nH3C MSR 20-15 IW (0235A31P)\nH3C MSR20-12 W (0235A32G)\n\nMSR30\n Fix in progress\nuse mitigations\n JD654A HP MSR30-60 POE Multi-Service Router\nJD657A HP MSR30-40 Multi-Service Router\nJD658A HP MSR30-60 Multi-Service Router\nJD660A HP MSR30-20 POE Multi-Service Router\nJD661A HP MSR30-40 POE Multi-Service Router\nJD666A HP MSR30-20 Multi-Service Router\nJF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF232A HP RT-MSR3040-AC-OVS-AS-H3\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)\nH3C MSR 30-20 (0235A19L)\nH3C MSR 30-20 POE (0235A239)\nH3C MSR 30-40 (0235A20J)\nH3C MSR 30-40 POE (0235A25R)\nH3C MSR 30-60 (0235A20K)\nH3C MSR 30-60 POE (0235A25S)\nH3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)\n\nMSR30-16\n Fix in progress\nuse mitigations\n JD659A HP MSR30-16 POE Multi-Service Router\nJD665A HP MSR30-16 Multi-Service Router\nJF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\nH3C MSR 30-16 (0235A237)\nH3C MSR 30-16 POE (0235A238)\n\nMSR30-1X\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\nH3C RT-MSR3011-AC-OVS-H3 (0235A29L)\n\nMSR50\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\n\nMSR50-G2\n Fix in progress\nuse mitigations\n JD429A HP MSR50 G2 Processor Module\nJD429B HP MSR50 G2 Processor Module\n H3C H3C MSR 50 Processor Module-G2 (0231A84Q)\nH3C MSR 50 High Performance Main Processing Unit 3GE (Combo)\n256F/1GD(0231A0KL)\n\nMSR20 Russian version\n Fix in progress\nuse mitigations\n JD663B HP MSR20-21 Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\n\nMSR20-1X Russian version\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\n H3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\n\nMSR30 Russian version\n Fix in progress\nuse mitigations\n JF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\n\nMSR30-1X Russian version\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C RT-MSR3011-AC-OVS-H3 (0235A29L)\nH3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\n\nMSR30-16 Russian version\n Fix in progress\nuse mitigations\n JF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\n\nMSR50 Russian version\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR 50 Processor Module (0231A791)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\n\nMSR50 G2 Russian version\n Fix in progress\nuse mitigations\n JD429B HP MSR50 G2 Processor Module\n H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD\n(0231A0KL)\n\nMSR9XX\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\nJG207A HP MSR900-W Router (NA)\nJG208A HP MSR920-W Router (NA)\n H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b\n(0235A0C2)\nH3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\n\nMSR9XX Russian version\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\n H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\nH3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\n\nMSR93X\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR93X Russian version\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR1000\n Fix in progress\nuse mitigations\n JG732A HP MSR1003-8 AC Router\n\nMSR2000\n Fix in progress\nuse mitigations\n JG411A HP MSR2003 AC Router\n\nMSR3000\n Fix in progress\nuse mitigations\n JG404A HP MSR3064 Router\nJG405A HP MSR3044 Router\nJG406A HP MSR3024 AC Router\nJG409A HP MSR3012 AC Router\nJG861A HP MSR3024 TAA-compliant AC Router\n\nMSR4000\n Fix in progress\nuse mitigations\n JG402A HP MSR4080 Router Chassis\nJG403A HP MSR4060 Router Chassis\nJG412A HP MSR4000 MPU-100 Main Processing Unit\n\nF5000\n Fix in progress\nuse mitigations\n JG216A HP F5000 Firewall Standalone Chassis\nJD259A HP A5000-A5 VPN Firewall Chassis\n H3C SecPath F5000-A5 Host System (0150A0AG)\n\nU200S and CS\n Fix in progress\nuse mitigations\n JD268A HP 200-CS UTM Appliance\nJD273A HP U200-S UTM Appliance\n H3C SecPath U200-S (0235A36N)\n\nU200A and M\n Fix in progress\nuse mitigations\n JD274A HP 200-M UTM Appliance\nJD275A HP U200-A UTM Appliance\n H3C SecPath U200-A (0235A36Q)\n\nF1000A and S\n Fix in progress\nuse mitigations\n JD270A HP S1000-S VPN Firewall Appliance\nJD271A HP S1000-A VPN Firewall Appliance\nJG213A HP F1000-S-EI VPN Firewall Appliance\nJG214A HP F1000-A-EI VPN Firewall Appliance\n\nSecBlade FW\n Fix in progress\nuse mitigations\n JC635A HP 12500 VPN Firewall Module\nJD245A HP 9500 VPN Firewall Module\nJD249A HP 10500/7500 Advanced VPN Firewall Mod\nJD250A HP 6600 Firewall Processing Rtr Module\nJD251A HP 8800 Firewall Processing Module\nJD255A HP 5820 VPN Firewall Module\n H3C S9500E SecBlade VPN Firewall Module (0231A0AV)\nH3C S7500E SecBlade VPN Firewall Module (0231A832)\nH3C SR66 Gigabit Firewall Module (0231A88A)\nH3C SR88 Firewall Processing Module (0231A88L)\nH3C S5820 SecBlade VPN Firewall Module (0231A94J)\n\nF1000E\n Fix in progress\nuse mitigations\n JD272A HP S1000-E VPN Firewall Appliance\n\nVSR1000\n Fix in progress\nuse mitigations\n JG810AAE HP VSR1001 Virtual Services Router\nJG811AAE HP VSR1001 Virtual Services Router\nJG812AAE HP VSR1004 Virtual Services Router\nJG813AAE HP VSR1008 Virtual Services Router\n\nWX5002/5004\n Fix in progress\nuse mitigations\n JD441A HP 5800 ACM for 64-256 APs\nJD447B HP WX5002 Access Controller\nJD448A HP A-WX5004 Access Controller\nJD448B HP WX5004 Access Controller\nJD469A HP A-WX5004 (3Com) Access Controller\nJG261A HP 5800 Access Controller OAA TAA Mod\n\nHP 850/870\n Fix in progress\nuse mitigations\n JG723A HP 870 Unified Wired-WLAN Appliance\nJG725A HP 870 Unifd Wrd-WLAN TAA Applnc\n\nHP 830\n Fix in progress\nuse mitigations\n JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch\nJG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch\nJG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch\nJG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch\n\nHP 6000\n Fix in progress\nuse mitigations\n JG639A HP 10500/7500 20G Unified Wired-WLAN Mod\nJG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod\n\nM220\n Fix in progress\nuse mitigations\n J9798A HP M220 802.11n AM Access Point\nJ9799A HP M220 802.11n WW Access Point\n\nNGFW\n Fix in progress\nuse mitigations\n JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic\nJC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic\nJC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic\nJC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic\nJC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic\n\niMC UAM 7.0\n Fix in progress\nuse mitigations\n JD144A HP IMC UAM S/W Module w/200-User License\nJF388A HP IMC UAM S/W Module w/200-user License\nJD435A HP IMC EAD Client Software\nJF388AAE HP IMC UAM S/W Module w/200-user E-LTU\nJG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU\n\niMC EAD 7.0\n Fix in progress\nuse mitigations\n JF391AAE HP IMC EAD S/W Module w/200-user E-LTU\nJG754AAE HP IMC EAD SW Module w/ 50-user E-LTU\nJD147A HP IMC Endpoint Admission Defense Software Module with 200-user\nLicense\nJF391A HP IMC EAD S/W Module w/200-user License\n\niMC PLAT 7.0\n Fix in progress\nuse mitigations\n JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU\nJG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU\nJG747AAE HP IMC Standard Software Platform with 50-node E-LTU\nJG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU\nJD125A HP IMC Standard Edition Software Platform with 100-node License\nJD815A HP IMC Standard Edition Software Platform with 100-node License\nJD816A HP A-IMC Standard Edition Software DVD Media\nJF377A HP IMC Standard Edition Software Platform with 100-node License\nJF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU\nJF289AAE HP Enterprise Management System to Intelligent Management Center\nUpgrade E-LTU\nTJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL\nnot HPNs)\nJF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU\nJG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU\nJD126A HP A-IMC Enterprise Software Platform with 200-node License\nJD808A HP A-IMC Enterprise Software Platform with 200-node License\nJD814A HP A-IMC Enterprise Edition Software DVD Media\nJF378A HP IMC Enterprise Edition Software Platform with 200-node License\nJG546AAE HP IMC Basic SW Platform w/50-node E-LTU\nJG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\nJG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU\nJG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU\nJG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition\nE-LTU\nJG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance\nSoftware E-LTU\n\nHISTORY\nVersion:1 (rev.1) - 20 June 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlOkrM4ACgkQ4B86/C0qfVn7/QCeK5T1H9dXfVQgIKSr5USqLmvq\nCtMAnjujH7e5aXfIOvxyyuB0FcSwIWCM\n=CEL7\n-----END PGP SIGNATURE-----\n. \nOpenSSL is a 3rd party product that is embedded with some HP printer\nproducts. This bulletin notifies HP Printer customers about impacted\nproducts. To obtain the updated firmware, go to www.hp.com and follow\nthese steps:\n\nSelect \"Drivers & Software\". \nEnter the appropriate product name listed in the table below into the search\nfield. \nClick on \"Search\". \nClick on the appropriate product. \nUnder \"Select operating system\" click on \"Cross operating system (BIOS,\nFirmware, Diagnostics, etc.)\"\nNote: If the \"Cross operating system ...\" link is not present, select\napplicable Windows operating system from the list. \nSelect the appropriate firmware update under \"Firmware\". \n\nFirmware Updates Table\n\nProduct Name\n Model Number\n Firmware Revision\n\nHP Color LaserJet CM4540 MFP\n CC419A, CC420A, CC421A\n v 2302963_436067 (or higher)\n\nHP Color LaserJet CP5525\n CE707A,CE708A,CE709A\n v 2302963_436070 (or higher)\n\nHP Color LaserJet Enterprise M750\n D3L08A, D3L09A, D3L10A\n v 2302963_436077 (or higher)\n\nHP Color LaserJet M651\n CZ255A, CZ256A, CZ257A, CZ258A\n v 2302963_436073 (or higher)\n\nHP Color LaserJet M680\n CZ248A, CZ249A\n v 2302963_436072 (or higher)\n\nHP Color LaserJet Flow M680\n CZ250A, CA251A\n v 2302963_436072 (or higher)\n\nHP LaserJet Enterprise 500 color MFP M575dn\n CD644A, CD645A\n v 2302963_436081 (or higher)\n\nHP LaserJet Enterprise 500 MFP M525f\n CF116A, CF117A\n v 2302963_436069 (or higher)\n\nHP LaserJet Enterprise 600 M601 Series\n CE989A, CE990A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise 600 M602 Series\n CE991A, CE992A, CE993A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise 600 M603 Series\n CE994A, CE995A, CE996A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise MFP M630 series\n B3G84A, B3G85A, B3G86A, J7X28A\n v 2303714_233000041 (or higher)\n\nHP LaserJet Enterprise 700 color M775 series\n CC522A, CC523A, CC524A, CF304A\n v 2302963_436079 (or higher)\n\nHP LaserJet Enterprise 700 M712 series\n CF235A, CF236A, CF238A\n v 2302963_436080 (or higher)\n\nHP LaserJet Enterprise 800 color M855\n A2W77A, A2W78A, A2W79A\n v 2302963_436076 (or higher)\n\nHP LaserJet Enterprise 800 color MFP M880\n A2W76A, A2W75A, D7P70A, D7P71A\n v 2302963_436068 (or higher)\n\nHP LaserJet Enterprise Color 500 M551 Series\n CF081A,CF082A,CF083A\n v 2302963_436083 (or higher)\n\nHP LaserJet Enterprise color flow MFP M575c\n CD646A\n v 2302963_436081 (or higher)\n\nHP LaserJet Enterprise flow M830z MFP\n CF367A\n v 2302963_436071 (or higher)\n\nHP LaserJet Enterprise flow MFP M525c\n CF118A\n v 2302963_436069 (or higher)\n\nHP LaserJet Enterprise M4555 MFP\n CE502A,CE503A, CE504A, CE738A\n v 2302963_436064 (or higher)\n\nHP LaserJet Enterprise M806\n CZ244A, CZ245A\n v 2302963_436075 (or higher)\n\nHP LaserJet Enterprise MFP M725\n CF066A, CF067A, CF068A, CF069A\n v 2302963_436078 (or higher)\n\nHP Scanjet Enterprise 8500 Document Capture Workstation\n L2717A, L2719A\n v 2302963_436065 (or higher)\n\nOfficeJet Enterprise Color MFP X585\n B5L04A, B5L05A,B5L07A\n v 2302963_436066 (or higher)\n\nOfficeJet Enterprise Color X555\n C2S11A, C2S12A\n v 2302963_436074 (or higher)\n\nHP Color LaserJet CP3525\n CC468A, CC469A, CC470A, CC471A\n v 06.183.1 (or higher)\n\nHP LaserJet M4345 Multifunction Printer\n CB425A, CB426A, CB427A, CB428A\n v 48.306.1 (or higher)\n\nHP LaserJet M5025 Multifunction Printer\n Q7840A\n v 48.306.1 (or higher)\n\nHP Color LaserJet CM6040 Multifunction Printer\n Q3938A, Q3939A\n v 52.256.1 (or higher)\n\nHP Color LaserJet Enterprise CP4525\n CC493A, CC494A, CC495A\n v 07.164.1 (or higher)\n\nHP Color LaserJet Enterprise CP4025\n CC489A, CC490A\n v 07.164.1 (or higher)\n\nHP LaserJet M5035 Multifunction Printer\n Q7829A, Q7830A, Q7831A\n v 48.306.1 (or higher)\n\nHP LaserJet M9050 Multifunction Printer\n CC395A\n v 51.256.1 (or higher)\n\nHP LaserJet M9040 Multifunction Printer\n CC394A\n v 51.256.1 (or higher)\n\nHP Color LaserJet CM4730 Multifunction Printer\n CB480A, CB481A, CB482A, CB483A\n v 50.286.1 (or higher)\n\nHP LaserJet M3035 Multifunction Printer\n CB414A, CB415A, CC476A, CC477A\n v 48.306.1 (or higher)\n\nHP 9250c Digital Sender\n CB472A\n v 48.293.1 (or higher)\n\nHP LaserJet Enterprise P3015\n CE525A,CE526A,CE527A,CE528A,CE595A\n v 07.186.1 (or higher)\n\nHP LaserJet M3027 Multifunction Printer\n CB416A, CC479A\n v 48.306.1 (or higher)\n\nHP LaserJet CM3530 Multifunction Printer\n CC519A, CC520A\n v 53.236.1 (or higher)\n\nHP Color LaserJet CP6015\n Q3931A, Q3932A, Q3933A, Q3934A, Q3935A\n v 04.203.1 (or higher)\n\nHP LaserJet P4515\n CB514A,CB515A, CB516A, CB517A\n v 04.213.1 (or higher)\n\nHP Color LaserJet CM6030 Multifunction Printer\n CE664A, CE665A\n v 52.256.1 (or higher)\n\nHP LaserJet P4015\n CB509A, CB526A, CB511A, CB510A\n v 04.213.1 (or higher)\n\nHP LaserJet P4014\n CB507A, CB506A, CB512A\n v 04.213.1 (or higher)\n\nHISTORY\nVersion:1 (rev.1) - 22 September 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "BID",
            id: "67899",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "128345",
         },
      ],
      trust: 2.7,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.kb.cert.org/vuls/id/978508",
            trust: 0.8,
            type: "poc",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0224",
            trust: 2.2,
         },
         {
            db: "CERT/CC",
            id: "VU#978508",
            trust: 2.1,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.3,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.3,
         },
         {
            db: "SECUNIA",
            id: "59215",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59441",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59784",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59885",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59495",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60049",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59375",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59132",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59446",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59827",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59380",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59365",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59451",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58639",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59916",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59055",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59530",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58615",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59502",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59529",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58579",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59338",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59824",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59310",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59202",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59990",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59449",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59135",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59518",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59163",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59429",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59445",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60567",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59447",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59362",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59231",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59389",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "61254",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59589",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59878",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59305",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60066",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60577",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59354",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59454",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59214",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59435",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58743",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58667",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59347",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59383",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59325",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59264",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59528",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59306",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58128",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59190",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58759",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58745",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59460",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59004",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59440",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59101",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59491",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59370",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59282",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59364",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59063",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59368",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59448",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58714",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59659",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59444",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59223",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59043",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59186",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58433",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58492",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59167",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59175",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59093",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60522",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59126",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59483",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58660",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59211",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59442",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59525",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59602",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59284",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58385",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59459",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58719",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60819",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59142",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58945",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59189",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59120",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "61815",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59438",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58930",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59894",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59374",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59012",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59191",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59192",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59506",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58742",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "60176",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59677",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59188",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "58716",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59661",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "59040",
            trust: 1,
         },
         {
            db: "SECTRACK",
            id: "1031032",
            trust: 1,
         },
         {
            db: "SECTRACK",
            id: "1031594",
            trust: 1,
         },
         {
            db: "SIEMENS",
            id: "SSA-234763",
            trust: 1,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "DLINK",
            id: "SAP10046",
            trust: 0.3,
         },
         {
            db: "JUNIPER",
            id: "JSA10643",
            trust: 0.3,
         },
         {
            db: "JUNIPER",
            id: "JSA10659",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03F",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03G",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03B",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03C",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03D",
            trust: 0.3,
         },
         {
            db: "JVN",
            id: "JVN61247051",
            trust: 0.3,
         },
         {
            db: "BID",
            id: "67899",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-0224",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127386",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127607",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127936",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127136",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127841",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127166",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127190",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128345",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            db: "BID",
            id: "67899",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "128345",
         },
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   id: "VAR-201406-0445",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.42688096370370365,
   },
   last_update_date: "2024-11-29T20:25:19.165000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Amazon Linux AMI: ALAS-2014-351",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-351",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03107 rev.3  -  Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=d0eef6c81e529a1b8e4ea4b72eaef4d0",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-350",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-350",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=b92b65104373bc8476811ff1b99cd369",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03107 rev.3  -  Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=a7d1e620ea07a6fd4d3ec24012763337",
         },
         {
            title: "Red Hat: CVE-2014-0224",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0224",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-3",
         },
         {
            title: "HP: HPSBPI03107 rev.3  -  Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBPI03107",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-4",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-2",
         },
         {
            title: "Debian Security Advisories: DSA-2950-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=909292f2afe623fbec51f7ab6b32f790",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Tenable Security Advisories: [R8] Tenable Products Affected by OpenSSL 'CCS Injection' Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-03",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2014-0224 ",
         },
         {
            title: "crochet-technologies",
            trust: 0.1,
            url: "https://github.com/crochet-technology/crochet-technologies ",
         },
         {
            title: "openssl-ccs-cve-2014-0224",
            trust: 0.1,
            url: "https://github.com/ssllabs/openssl-ccs-cve-2014-0224 ",
         },
         {
            title: "android-development-best-practices",
            trust: 0.1,
            url: "https://github.com/niharika2810/android-development-best-practices ",
         },
         {
            title: "ssl-grader",
            trust: 0.1,
            url: "https://github.com/SSLyze410-SSLGrader-wCipherSuite-info/ssl-grader ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/dtarnawsky/capacitor-plugin-security-provider ",
         },
         {
            title: "qualysparser",
            trust: 0.1,
            url: "https://github.com/pr4jwal/qualysparser ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Wanderwille/13.01 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0224",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-326",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.9,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 2.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821",
         },
         {
            trust: 2.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 1.6,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615",
         },
         {
            trust: 1.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29217",
         },
         {
            trust: 1.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.3,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 1.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1",
         },
         {
            trust: 1.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233",
         },
         {
            trust: 1.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29195",
         },
         {
            trust: 1.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html",
         },
         {
            trust: 1.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 1.3,
            url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071",
         },
         {
            trust: 1.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 1.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833",
         },
         {
            trust: 1.3,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 1.3,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-14-018/",
         },
         {
            trust: 1.3,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020172",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0630.html",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0631.html",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0633.html",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0632.html",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0627.html",
         },
         {
            trust: 1.3,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0680.html",
         },
         {
            trust: 1.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 1.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836",
         },
         {
            trust: 1.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095740",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731",
         },
         {
            trust: 1.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732",
         },
         {
            trust: 1.3,
            url: "http://www.kb.cert.org/vuls/id/978508",
         },
         {
            trust: 1.1,
            url: "http://www.freebsd.org/security/advisories/freebsd-sa-14:14.openssl.asc",
         },
         {
            trust: 1.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04401858",
         },
         {
            trust: 1.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1,
            url: "http://seclists.org/fulldisclosure/2014/jun/38",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1iv61506",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676877",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/site/blogs/766093/posts/908133",
         },
         {
            trust: 1,
            url: "http://support.apple.com/kb/ht6443",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60049",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58945",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58759",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58742",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59264",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58639",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1,
            url: "http://linux.oracle.com/errata/elsa-2014-1053.html",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
         },
         {
            trust: 1,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59677",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59365",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59446",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58714",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59502",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59878",
         },
         {
            trust: 1,
            url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_release_notes.pdf",
         },
         {
            trust: 1,
            url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59589",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080",
         },
         {
            trust: 1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58716",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59444",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59347",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59459",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59354",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59093",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015264",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59101",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2",
         },
         {
            trust: 1,
            url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59454",
         },
         {
            trust: 1,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1,
            url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/releasenotes_for_snare_for_mssql.pdf",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59374",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1,
            url: "http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59441",
         },
         {
            trust: 1,
            url: "http://www.splunk.com/view/sp-caaam2d",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59284",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60176",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59990",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59529",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59827",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59231",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786",
         },
         {
            trust: 1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59824",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59202",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58433",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58579",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59305",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60819",
         },
         {
            trust: 1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59012",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59375",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59518",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2",
         },
         {
            trust: 1,
            url: "http://puppetlabs.com/security/cve/cve-2014-0224",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59120",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59460",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59445",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2",
         },
         {
            trust: 1,
            url: "https://www.ibm.com/support/docview.wss?uid=ssg1s1004670",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59338",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59525",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60577",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59440",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58930",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59447",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2",
         },
         {
            trust: 1,
            url: "http://www.securitytracker.com/id/1031594",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg1it02314",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59132",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59370",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59310",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59142",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59483",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59448",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59282",
         },
         {
            trust: 1,
            url: "http://ccsinjection.lepidum.co.jp",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/61254",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59784",
         },
         {
            trust: 1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004690",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58492",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59885",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59491",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/61815",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58385",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59528",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60522",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58128",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59306",
         },
         {
            trust: 1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:105",
         },
         {
            trust: 1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6060&myns=phmc&mync=e",
         },
         {
            trust: 1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59389",
         },
         {
            trust: 1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6061&myns=phmc&mync=e",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58743",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59530",
         },
         {
            trust: 1,
            url: "http://www.securitytracker.com/id/1031032",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59191",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59449",
         },
         {
            trust: 1,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58660",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59063",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59135",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59040",
         },
         {
            trust: 1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59364",
         },
         {
            trust: 1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=bc8923b1ec9c467755cd86f7848c50ee8812e441",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59602",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58719",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59211",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1020948",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59368",
         },
         {
            trust: 1,
            url: "https://www.ibm.com/support/docview.wss?uid=ssg1s1004671",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59192",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58667",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59215",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59495",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59659",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59661",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58745",
         },
         {
            trust: 1,
            url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download",
         },
         {
            trust: 1,
            url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/releasenotes_for_snare_for_windows.pdf",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60066",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59435",
         },
         {
            trust: 1,
            url: "https://discussions.nessus.org/thread/7517",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59043",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59163",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59126",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59189",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59223",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0626.html",
         },
         {
            trust: 1,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0624.html",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333",
         },
         {
            trust: 1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/58615",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59451",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59188",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59167",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59186",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59442",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59916",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59362",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59894",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/60567",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59190",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59325",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59004",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59506",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2",
         },
         {
            trust: 1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015300",
         },
         {
            trust: 1,
            url: "https://filezilla-project.org/versions.php?type=server",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2",
         },
         {
            trust: 1,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59380",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59175",
         },
         {
            trust: 1,
            url: "http://esupport.trendmicro.com/solution/en-us/1103813.aspx",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59214",
         },
         {
            trust: 1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:106",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2",
         },
         {
            trust: 1,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004678",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59429",
         },
         {
            trust: 1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59438",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59383",
         },
         {
            trust: 1,
            url: "http://secunia.com/advisories/59055",
         },
         {
            trust: 1,
            url: "http://www.kerio.com/support/kerio-control/release-history",
         },
         {
            trust: 0.8,
            url: "http://ccsinjection.lepidum.co.jp/",
         },
         {
            trust: 0.8,
            url: "http://ccsinjection.lepidum.co.jp/blog/2014-06-05/ccs-injection-en/index.html",
         },
         {
            trust: 0.8,
            url: "https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004",
         },
         {
            trust: 0.8,
            url: "http://support.attachmate.com/techdocs/2700.html",
         },
         {
            trust: 0.8,
            url: "https://www.debian.org/security/2014/dsa-2950",
         },
         {
            trust: 0.8,
            url: "https://admin.fedoraproject.org/updates/openssl-1.0.1e-38.fc19",
         },
         {
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/av14-002.html",
         },
         {
            trust: 0.8,
            url: "http://nvidia.custhelp.com/app/answers/detail/a_id/3566",
         },
         {
            trust: 0.8,
            url: "http://linux.oracle.com/errata/elsa-2014-0625.html",
         },
         {
            trust: 0.8,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00003.html",
         },
         {
            trust: 0.8,
            url: "http://www.ubuntu.com/usn/usn-2232-1/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.7,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24032618",
         },
         {
            trust: 0.3,
            url: "http://www.sophos.com/en-us/support/knowledgebase/121112.aspx",
         },
         {
            trust: 0.3,
            url: "http://sylpheed.sraoss.jp/en/news.html",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list&showdraft=false",
         },
         {
            trust: 0.3,
            url: "http://www.arubanetworks.com/support/alerts/aid-06062014.txt",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2014/06/chrome-for-android-update.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "http://bugs.python.org/issue21671",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10046",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004805",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04438404",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687640",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21682840",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678123",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678073",
         },
         {
            trust: 0.3,
            url: "http://www.websense.com/support/article/kbarticle/july-2014-hotfix-summary-for-websense-solutions",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10643&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://jvn.jp/en/jp/jvn61247051/index.html",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://blogs.sophos.com/2014/06/10/openssl-man-in-the-middle-vulnerability-sophos-product-status-2/",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20140606_001_en.pdf",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004758",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004747",
         },
         {
            trust: 0.3,
            url: "http://openvpn.net/index.php/open-source/downloads.html",
         },
         {
            trust: 0.3,
            url: "http://www8.hp.com/us/en/software-solutions/operations-analytics-operations-analysis/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "https://community.rapid7.com/community/metasploit/blog/2014/06/05/security-advisory-openssl-vulnerabilities-cve-2014-0224-cve-2014-0221-in-metasploit",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685551",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096059",
         },
         {
            trust: 0.3,
            url: "http://blogs.splunk.com/2014/06/09/splunk-and-the-latest-openssl-vulnerabilities/",
         },
         {
            trust: 0.3,
            url: "http://www.marshut.com/ixwnpv/stunnel-5-02-released.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.sophos.com/2014/06/16/utm-up2date-9-113-released/",
         },
         {
            trust: 0.3,
            url: "http://blogs.sophos.com/2014/06/18/utm-up2date-9-203-released/",
         },
         {
            trust: 0.3,
            url: " https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04404764",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04385138",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101007404",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100180978",
         },
         {
            trust: 0.3,
            url: "http://ics-cert.us-cert.gov/advisories/icsa-14-198-03",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/21",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/9",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10659",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03d",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03g",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181096",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678040",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1it02314",
         },
         {
            trust: 0.3,
            url: "http://kb.parallels.com/en/121916",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24036409",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24032650#5.0.0.15",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24032651",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24034955",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020948",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04397114",
         },
         {
            trust: 0.3,
            url: " https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479505",
         },
         {
            trust: 0.3,
            url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512909",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368264",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347622",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347711",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04351097",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04363613",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368546",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04370307",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04392919",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04398968",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04401666",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04451722",
         },
         {
            trust: 0.3,
            url: "https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04406535-1%257cdoclocale%253d%",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04425253",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04595094",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001840",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181215",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21680546",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21680511,swg21680439,swg21680673,swg21680546",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg24037729",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678413",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21680706,swg21680707,nas8n1020200,swg21680511,swg21680439,swg21680673,swg21680546",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21680673,swg21680546",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21680707,nas8n1020200,swg21680511,swg21680439,swg21680673,swg21680546",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004830",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676673",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678660",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21680439,swg21680673,swg21680546",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677891",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676536",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095910",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/33a01-5228bdf5d027e/cert_security_mini-_bulletin_xrx15ao_for_cq8570-cq8870_v1-0.pdf",
         },
         {
            trust: 0.3,
            url: "http://www.novell.com/support/kb/doc.php?id=7015158",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.paloaltonetworks.com/home/detail/23?aspxautodetectcookiesupport=1",
         },
         {
            trust: 0.3,
            url: "https://bto.bluecoat.com/security-advisory/sa80",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181079",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181566",
         },
         {
            trust: 0.3,
            url: "https://library.netapp.com/ecm/ecm_get_file/ecmp1636026",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676276",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676786",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0629.html",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676840",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21677225",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682398",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095738",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21683336",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682023",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021064",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682026",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682024",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21677080",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676877",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095841",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690128",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004678",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004824",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004690",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676542",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676543",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004744",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676333",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676708",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676505",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03b",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03c",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03f",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update-for-chrome-os.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001842",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001839",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004821",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004670",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=ssg1s1004671",
         },
         {
            trust: 0.3,
            url: "http://www.ubuntu.com/usn/usn-2232-4/",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://winscp.net/eng/docs/history#5.5.4",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall_patchaccess",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/fpdownload.html",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00073",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00074",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00070",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00076",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00079",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00071",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00075",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00078",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00072",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00077",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayp",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/exsc_00017",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/exsc_00015",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/exsc_00016",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-3",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1332643",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=c03536",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "BID",
            id: "67899",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "128345",
         },
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            db: "BID",
            id: "67899",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "128345",
         },
         {
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-06-05T00:00:00",
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "BID",
            id: "67899",
         },
         {
            date: "2014-07-09T04:03:23",
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            date: "2014-07-24T23:47:46",
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            date: "2014-08-20T15:18:26",
            db: "PACKETSTORM",
            id: "127936",
         },
         {
            date: "2014-06-17T23:11:00",
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            date: "2014-08-12T20:56:59",
            db: "PACKETSTORM",
            id: "127841",
         },
         {
            date: "2014-06-24T00:52:51",
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            date: "2014-06-24T01:45:14",
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            date: "2014-09-22T16:56:00",
            db: "PACKETSTORM",
            id: "128345",
         },
         {
            date: "2014-06-05T21:55:07.817000",
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-10-27T00:00:00",
            db: "CERT/CC",
            id: "VU#978508",
         },
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0224",
         },
         {
            date: "2017-10-19T03:03:00",
            db: "BID",
            id: "67899",
         },
         {
            date: "2024-11-21T02:01:41",
            db: "NVD",
            id: "CVE-2014-0224",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "67899",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL is vulnerable to a man-in-the-middle attack",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#978508",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "67899",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0124
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0124",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60985",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0475",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0475",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-60477",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0475",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0475",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-051",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60477",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "BID",
            id: "60985",
         },
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0475",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "81403",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60985",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60477",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            db: "BID",
            id: "60985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   id: "VAR-201307-0124",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T13:04:37.697000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81403",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0475",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0475",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81403",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            db: "BID",
            id: "60985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            db: "BID",
            id: "60985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60985",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            date: "2013-07-03T13:54:30.977000",
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60477",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60985",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
         {
            date: "2017-08-29T01:33:02.933000",
            db: "NVD",
            id: "CVE-2013-0475",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003196",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-051",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0031
Vulnerability from variot

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c. OpenSSL is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to cause a denial-of-service condition. Versions prior to OpenSSL 1.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2016:1940-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1940.html Issue date: 2016-09-27 CVE Names: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 =====================================================================

  1. Summary:

An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-2178)

  • It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181)

  • An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. (CVE-2016-2182)

  • A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)

This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.

  • An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. (CVE-2016-6302)

  • Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)

  • An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() 1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-1.0.1e-48.el6_8.3.ppc.rpm openssl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-1.0.1e-48.el6_8.3.s390.rpm openssl-1.0.1e-48.el6_8.3.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-devel-1.0.1e-48.el6_8.3.s390.rpm openssl-devel-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-static-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-perl-1.0.1e-48.el6_8.3.s390x.rpm openssl-static-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

ppc64: openssl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-1.0.1e-51.el7_2.7.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-devel-1.0.1e-51.el7_2.7.s390.rpm openssl-devel-1.0.1e-51.el7_2.7.s390x.rpm openssl-libs-1.0.1e-51.el7_2.7.s390.rpm openssl-libs-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-static-1.0.1e-51.el7_2.7.ppc.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-perl-1.0.1e-51.el7_2.7.s390x.rpm openssl-static-1.0.1e-51.el7_2.7.s390.rpm openssl-static-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-2179 https://access.redhat.com/security/cve/CVE-2016-2180 https://access.redhat.com/security/cve/CVE-2016-2181 https://access.redhat.com/security/cve/CVE-2016-2182 https://access.redhat.com/security/cve/CVE-2016-6302 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-6306 https://access.redhat.com/security/updates/classification/#important https://www.openssl.org/news/secadv/20160922.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI xpTW7ApBLmKhVjs49DGYouI= =4VgY -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Additional information can be found at https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/

CVE-2016-2178

Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
leak in the DSA code.

CVE-2016-2179 / CVE-2016-2181

Quan Luo and the OCAP audit team discovered denial of service
vulnerabilities in DTLS.

For the stable distribution (jessie), these problems have been fixed in version 1.0.1t-1+deb8u4.

For the unstable distribution (sid), these problems will be fixed soon. ========================================================================== Ubuntu Security Notice USN-3087-2 September 23, 2016

openssl regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

USN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was incomplete and caused a regression when parsing certificates. This update fixes the problem.

We apologize for the inconvenience. This issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178) Quan Luo discovered that OpenSSL did not properly restrict the lifetime of queue entries in the DTLS implementation. (CVE-2016-2181) Shi Lei discovered that OpenSSL incorrectly validated division results. (CVE-2016-2182) Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks. (CVE-2016-2183) Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303) Shi Lei discovered that OpenSSL incorrectly performed certain message length checks. (CVE-2016-6306)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.5

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.21

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.38

After a standard system update you need to reboot your computer to make all the necessary changes. OpenSSL Security Advisory [22 Sep 2016] ========================================

OCSP Status Request extension unbounded memory growth (CVE-2016-6304)

Severity: High

A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will eventually lead to a Denial Of Service attack through memory exhaustion. Servers with a default configuration are vulnerable even if they do not support OCSP. Builds using the "no-ocsp" build time option are not affected.

Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support.

OpenSSL 1.1.0 users should upgrade to 1.1.0a OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

SSL_peek() hang on empty record (CVE-2016-6305)

Severity: Moderate

OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an empty record. This could be exploited by a malicious peer in a Denial Of Service attack.

OpenSSL 1.1.0 users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The fix was developed by Matt Caswell of the OpenSSL development team.

SWEET32 Mitigation (CVE-2016-2183)

Severity: Low

SWEET32 (https://sweet32.info) is an attack on older block cipher algorithms that use a block size of 64 bits. In mitigation for the SWEET32 attack DES based ciphersuites have been moved from the HIGH cipherstring group to MEDIUM in OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had these ciphersuites disabled by default.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 16th August 2016 by Karthikeyan Bhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the OpenSSL development team.

OOB write in MDC2_Update() (CVE-2016-6303)

Severity: Low

An overflow can occur in MDC2_Update() either if called directly or through the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption.

The amount of data needed is comparable to SIZE_MAX which is impractical on most platforms.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Malformed SHA512 ticket DoS (CVE-2016-6302)

Severity: Low

If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a DoS attack where a malformed ticket will result in an OOB read which will ultimately crash.

The use of SHA512 in TLS session tickets is comparatively rare as it requires a custom server callback and ticket lookup mechanism.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB write in BN_bn2dec() (CVE-2016-2182)

Severity: Low

The function BN_bn2dec() does not check the return value of BN_div_word(). This can cause an OOB write if an application uses this function with an overly large BIGNUM. This could be a problem if an overly large certificate or CRL is printed out from an untrusted source. TLS is not affected because record limits will reject an oversized certificate before it is parsed.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB read in TS_OBJ_print_bio() (CVE-2016-2180)

Severity: Low

The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is the total length the OID text representation would use and not the amount of data written. This will result in OOB reads when large OIDs are presented.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Pointer arithmetic undefined behaviour (CVE-2016-2177)

Severity: Low

Avoid some undefined pointer arithmetic

A common idiom in the codebase is to check limits in the following manner: "p + len > limit"

Where "p" points to some malloc'd data of SIZE bytes and limit == p + SIZE

"len" here could be from some externally supplied data (e.g. from a TLS message).

The rules of C pointer arithmetic are such that "p + len" is only well defined where len <= SIZE. Therefore the above idiom is actually undefined behaviour.

For example this could cause problems if some malloc implementation provides an address for "p" such that "p + len" actually overflows for values of len that are too big and therefore p + len < limit.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team.

Constant time flag not preserved in DSA signing (CVE-2016-2178)

Severity: Low

Operations in the DSA signing algorithm should run in constant time in order to avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that a non-constant time codepath is followed for certain operations. This has been demonstrated through a cache-timing attack to be sufficient for an attacker to recover the private DSA key.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by César Pereida.

DTLS buffered message DoS (CVE-2016-2179)

Severity: Low

In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed. An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simulataneous connections an attacker could cause a DoS attack through memory exhaustion.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was developed by Matt Caswell of the OpenSSL development team.

DTLS replay protection DoS (CVE-2016-2181)

Severity: Low

A flaw in the DTLS replay attack protection mechanism means that records that arrive for future epochs update the replay protection "window" before the MAC for the record has been validated. This could be exploited by an attacker by sending a record for the next epoch (which does not have to decrypt or have a valid MAC), with a very large sequence number. This means that all subsequent legitimate packets are dropped causing a denial of service for a specific DTLS connection.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. The fix was developed by Matt Caswell of the OpenSSL development team.

Certificate message OOB reads (CVE-2016-6306)

Severity: Low

In OpenSSL 1.0.2 and earlier some missing message length checks can result in OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical DoS risk but this has not been observed in practice on common platforms.

The messages affected are client certificate, client certificate request and server certificate. As a result the attack can only be performed against a client or a server which enables client authentication.

OpenSSL 1.1.0 is not affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)

Severity: Low

A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect DTLS users.

OpenSSL 1.1.0 TLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)

Severity: Low

This issue is very similar to CVE-2016-6307. The underlying defect is different but the security analysis and impacts are the same except that it impacts DTLS.

A DTLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect TLS users.

OpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade.

Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv/20160922.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0031",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1q",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.1.0",
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0",
         },
         {
            model: "enterpriseidentitymanager",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "esmpro/serveragentservice",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "(linux edition )",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "sg3600 all series",
         },
         {
            model: "ix1000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.4",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.4",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard v8.2 to  v9.4",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v8.5",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "stealthwatch udp director",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud web security",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "webex centers t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13150-13",
         },
         {
            model: "clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified contact center enterprise live data server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "nexus series blade switches 4.1 e1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "project openssl 1.0.2i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69010",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "ucs central software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance media server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13",
         },
         {
            model: "stealthwatch management console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment 5.1.fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.2",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.5",
         },
         {
            model: "project openssl 1.0.2g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "jabber software development kit",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified workforce optimization",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "industrial router 1.2.1rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "910",
         },
         {
            model: "nexus intercloud for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.14",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "asr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3400",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nexus series switches standalone nx-os mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3.1",
         },
         {
            model: "nexus series switches standalone nx-os mode 7.0 i5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.11",
         },
         {
            model: "intelligent automation for cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.26",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.4",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime license manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
         {
            model: "stealthwatch flowcollector sflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "visual quality experience server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.11",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "jd edwards enterpriseone tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "9.2.1.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.9",
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "agent for openflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.8",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154540",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.15",
         },
         {
            model: "telepresence sx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime collaboration assurance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asa next-generation firewall services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email security appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.0.1",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8200",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.9",
         },
         {
            model: "unified communications manager im & presence service (formerly c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.3",
         },
         {
            model: "webex meetings for blackberry",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.5",
         },
         {
            model: "lancope stealthwatch flowcollector sflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.1",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.2",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.1.3",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x4.0.7",
         },
         {
            model: "common services platform collector",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.11",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "partner support service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "media services interface",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus intercloud",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.9",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime collaboration assurance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "email gateway 7.6.2h968406",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "common services platform collector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "webex meetings client on-premises",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "unified wireless ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified intelligence center",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6(1)",
         },
         {
            model: "services provisioning platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs b-series blade servers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1.3",
         },
         {
            model: "nac appliance clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asa next-generation firewall services",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.2",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "unified sip proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.405",
         },
         {
            model: "unified attendant console premium edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "api gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.2.4.0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "services provisioning platform sfp1.1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "small business spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.8",
         },
         {
            model: "mediasense",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.5",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "jabber for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3.4",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30002.9",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.20",
         },
         {
            model: "project openssl 1.0.1r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3.8",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "stealthwatch identity",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.2",
         },
         {
            model: "application policy infrastructure controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.1",
         },
         {
            model: "unified workforce optimization quality management solution 11.5 su1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "show and share",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system ex series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "universal small cell iuh",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.2",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.5",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11.1",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "ucs director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "infinity",
            scope: "ne",
            trust: 0.3,
            vendor: "pexip",
            version: "13",
         },
         {
            model: "jabber client framework components",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "webex meetings client on-premises t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "dcm series d9900 digital content manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70006.2.19",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "unified attendant console business edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.4",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "mds series multilayer switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "prime network services controller 1.01u",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.9.15.9.8",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.0.10",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "nexus series switches 5.2 sv3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v",
         },
         {
            model: "telepresence system tx1310",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications domain manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3103204.4",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.08",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.10",
         },
         {
            model: "project openssl 1.0.2h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise content delivery system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.11",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.1",
         },
         {
            model: "telepresence system ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex business suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dx series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.5(3)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.18",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series blade switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-376.1",
         },
         {
            model: "jabber for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "telepresence profile series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.1.0.0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.10",
         },
         {
            model: "ace30 application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.28",
         },
         {
            model: "edge digital media player 1.6rb5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "300",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.12",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69450",
         },
         {
            model: "telepresence isdn gateway mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "wireless lan controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.4",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.3",
         },
         {
            model: "unified contact center enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.404",
         },
         {
            model: "telepresence system tx1310",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.151.05",
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.33",
         },
         {
            model: "telepresence mx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0(1)",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.5.12.23",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "connected grid routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.401",
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.8",
         },
         {
            model: "unity express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.7",
         },
         {
            model: "project openssl 1.0.2f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.21",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "tandberg codian isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway 7.6.405h1165239",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "jabber guest",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.9",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.9.0",
         },
         {
            model: "digital media manager 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1901.3",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "asr series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500021.2",
         },
         {
            model: "project openssl 1.0.1t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-37",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1545410.7",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.12",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "broadband access center telco and wireless",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.3",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.19",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.25",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.0",
         },
         {
            model: "webex meetings server multimedia platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "unified ip conference phone 10.3.1sr4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3.5",
         },
         {
            model: "project openssl 1.0.2d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "series stackable managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "prime access registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "stealthwatch flowcollector netflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.2",
         },
         {
            model: "ucs manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.11",
         },
         {
            model: "prime optical",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "network analysis module",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "series stackable",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console department edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "78000",
         },
         {
            model: "aironet series access points",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "27000",
         },
         {
            model: "onepk all-in-one virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "industrial router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9100",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.1",
         },
         {
            model: "unified intelligence center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "13006.1",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.116",
         },
         {
            model: "cloupia unified infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11006.1",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "packaged contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "telepresence sx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "project openssl 1.0.1u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "project openssl 1.0.1n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nac appliance clean access server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "project openssl 1.0.1o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.0.1",
         },
         {
            model: "webex meetings for windows phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime optical for service providers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart care",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.11",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "edge digital media player 1.2rb1.0.3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "340",
         },
         {
            model: "network performance analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2.19",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.55",
         },
         {
            model: "unified ip conference phone for third-party call control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "project openssl 1.0.2e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "webex meetings for windows phone",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "82.8",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl 1.0.1q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.7",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.7",
         },
         {
            model: "telepresence integrator c series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "agent desktop",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment intirim fix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.133",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.3",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "webex meetings client hosted",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "content security management appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.140",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.8",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "intrusion prevention system solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.1",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.14",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.4",
         },
         {
            model: "jabber client framework components",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime ip express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified sip proxy software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "telepresence system tx9000",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.4",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for mac",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "netflow generation appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.403",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "unified sip proxy software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.4.7895",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "mobility services engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "telepresence server and mse",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "701087104.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.10",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.6",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "ucs series and series fabric interconnects",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "620063000",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "webex meeting center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.4",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.3.0",
         },
         {
            model: "netflow generation appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(1)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.13",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.6",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.2",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "socialminer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.3-6513",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.28",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "40002.9",
         },
         {
            model: "intracer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.29",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.07",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.3",
         },
         {
            model: "spa51x ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.8.15.7.15",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.3.0",
         },
         {
            model: "prime infrastructure",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9.1",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.23",
         },
         {
            model: "computer telephony integration object server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3103200",
         },
         {
            model: "small business series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.24",
         },
         {
            model: "content security appliance update servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "videoscape anyres live",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.7.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.6",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.2",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.4",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.1.9",
         },
         {
            model: "universal small cell iuh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.2",
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.4",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-326.1",
         },
         {
            model: "unity express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtualization experience media edition",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1.8",
         },
         {
            model: "small business series managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.1",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10006.1",
         },
         {
            model: "telepresence isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "telepresence mcu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "series smart plus switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2200",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.4",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "virtual security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.4.1102",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "telepresence tx9000 series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0x",
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "telepresence system series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30006.1",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.2.0",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.4",
         },
         {
            model: "one portal",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.13",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.12",
         },
         {
            model: "ucs b-series blade servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "unified attendant console standard",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.5",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.32",
         },
         {
            model: "enterprise content delivery system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.9",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "7",
         },
         {
            model: "mds series multilayer switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "-3.0",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "4",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence tx9000 series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "prime performance manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart net total care local collector appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.8.9",
         },
         {
            model: "network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "prime performance manager sp1611",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.7",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.12",
         },
         {
            model: "lancope stealthwatch flowcollector netflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.22",
         },
         {
            model: "unified ip phone 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6901",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.23",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.16",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.10",
         },
         {
            model: "telepresence server and mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "701087100",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.2",
         },
         {
            model: "mds series multilayer switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "90006.2.19",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270015.5(3)",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-32",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.30",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.4",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.3.0.1098",
         },
         {
            model: "webex meetings for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "digital media manager 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unified workforce optimization quality management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "telepresence integrator c series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.3",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.13",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "cloud object storage",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.5",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.14",
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.4",
         },
         {
            model: "project openssl",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: "1.1",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.4",
         },
         {
            model: "application and content networking system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.7.0",
         },
         {
            model: "ace application control engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "47100",
         },
         {
            model: "oss support tools",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "8.15.17.3.14",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "x0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.2.0",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.2",
         },
         {
            model: "prime infrastructure plug and play standalone gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtual security gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.6",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.2.19",
         },
         {
            model: "telepresence conductor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.3",
         },
         {
            model: "application policy infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8.1",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.1",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "telepresence video communication server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "connected analytics for collaboration",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.16",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "multicast manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "5",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.8",
         },
         {
            model: "webex node for mcs",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mcu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1.89)",
         },
         {
            model: "management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.003(002)",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.31",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8204.4",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.2c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.13",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.400",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "expressway series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "prime network",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "431",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "unified attendant console enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "small business spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.26",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "network analysis module 6.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence system ex series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "mxe series media experience engines",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "35000",
         },
         {
            model: "project openssl 1.0.2b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "videoscape control suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "ip series phones vpn feature",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800-0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.3",
         },
         {
            model: "emergency responder",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.27",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.17",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.18",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.2.0.0",
         },
         {
            model: "unified meetingplace 8.6mr1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "email gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.406-3402.103",
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70002.9",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "spa525g 5-line ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "secure access control system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.22",
         },
         {
            model: "unified ip conference phone for third-party call control 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "unified ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "visual quality experience tools server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtualization experience media edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.3.2",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway 7.6.405h1157986",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "registered envelope service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.5.12.23",
         },
         {
            model: "firesight system software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0.4",
         },
         {
            model: "webex meetings client hosted t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.15",
         },
         {
            model: "unified meetingplace",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "unified contact center express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "6",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "webex meetings server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.1.30",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.402",
         },
         {
            model: "project openssl 1.0.1p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "92987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:capssuite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterpriseidentitymanager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragent",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragentservice",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix1000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2016-2179",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2016-2179",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2016-2179",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2016-2179",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2016-2179",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201609-103",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-2179",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c. OpenSSL is prone to multiple denial-of-service vulnerabilities. \nAn attacker can exploit these issues to cause a denial-of-service condition. \nVersions prior to OpenSSL 1.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2016:1940-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1940.html\nIssue date:        2016-09-27\nCVE Names:         CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 \n                   CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 \n                   CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 \n=====================================================================\n\n1. Summary:\n\nAn update for openssl is now available for Red Hat Enterprise Linux 6 and\nRed Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and\nTransport Layer Security (TLS) protocols, as well as a full-strength\ngeneral-purpose cryptography library. A remote attacker\ncould cause a TLS server using OpenSSL to consume an excessive amount of\nmemory and, possibly, exit unexpectedly after exhausting all available\nmemory, if it enabled OCSP stapling support. \n(CVE-2016-2178)\n\n* It was discovered that the Datagram TLS (DTLS) implementation could fail\nto release memory in certain cases. A malicious DTLS client could cause a\nDTLS server using OpenSSL to consume an excessive amount of memory and,\npossibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw\nto make a DTLS server using OpenSSL to reject further packets sent from a\nDTLS client over an established DTLS connection. (CVE-2016-2181)\n\n* An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec()\nfunction. (CVE-2016-2182)\n\n* A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL\nprotocol. A man-in-the-middle attacker could use this flaw to recover some\nplaintext data by capturing large amounts of encrypted traffic between\nTLS/SSL server and client if the communication used a DES/3DES based\nciphersuite. (CVE-2016-2183)\n\nThis update mitigates the CVE-2016-2183 issue by lowering priority of DES\ncipher suites so they are not preferred over cipher suites using AES. For\ncompatibility reasons, DES cipher suites remain enabled by default and\nincluded in the set of cipher suites identified by the HIGH cipher string. \nFuture updates may move them to MEDIUM or not enable them by default. \n\n* An integer underflow flaw leading to a buffer over-read was found in the\nway OpenSSL parsed TLS session tickets. (CVE-2016-6302)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed\npointer arithmetic. A remote attacker could possibly use these flaws to\ncause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\n* An out of bounds read flaw was found in the way OpenSSL formatted Public\nKey Infrastructure Time-Stamp Protocol data for printing. An attacker could\npossibly cause an application using OpenSSL to crash if it printed time\nstamp data from the attacker. A remote attacker could\npossibly use these flaws to crash a TLS/SSL server or client using OpenSSL. \n(CVE-2016-6306)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304\nand CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase\n1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation\n1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio()\n1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()\n1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection\n1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)\n1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer\n1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks\n1377594 - CVE-2016-6306 openssl: certificate message OOB reads\n1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-static-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nppc64:\nopenssl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-2177\nhttps://access.redhat.com/security/cve/CVE-2016-2178\nhttps://access.redhat.com/security/cve/CVE-2016-2179\nhttps://access.redhat.com/security/cve/CVE-2016-2180\nhttps://access.redhat.com/security/cve/CVE-2016-2181\nhttps://access.redhat.com/security/cve/CVE-2016-2182\nhttps://access.redhat.com/security/cve/CVE-2016-6302\nhttps://access.redhat.com/security/cve/CVE-2016-6304\nhttps://access.redhat.com/security/cve/CVE-2016-6306\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://www.openssl.org/news/secadv/20160922.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI\nxpTW7ApBLmKhVjs49DGYouI=\n=4VgY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Additional information can be found at\n    https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/    \n\nCVE-2016-2178\n\n    Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing\n    leak in the DSA code. \n\nCVE-2016-2179 / CVE-2016-2181\n\n    Quan Luo and the OCAP audit team discovered denial of service\n    vulnerabilities in DTLS. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.0.1t-1+deb8u4. \n\nFor the unstable distribution (sid), these problems will be fixed soon. ==========================================================================\nUbuntu Security Notice USN-3087-2\nSeptember 23, 2016\n\nopenssl regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nUSN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was\nincomplete and caused a regression when parsing certificates. This update\nfixes the problem. \n\nWe apologize for the inconvenience. This\n issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178)\n  Quan Luo discovered that OpenSSL did not properly restrict the lifetime\n of queue entries in the DTLS implementation. (CVE-2016-2181)\n  Shi Lei discovered that OpenSSL incorrectly validated division results. \n (CVE-2016-2182)\n  Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES\n ciphers were vulnerable to birthday attacks. \n (CVE-2016-2183)\n  Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303)\n  Shi Lei discovered that OpenSSL incorrectly performed certain message\n length checks. (CVE-2016-6306)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n  libssl1.0.0                     1.0.2g-1ubuntu4.5\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.21\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.38\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \nOpenSSL Security Advisory [22 Sep 2016]\n========================================\n\nOCSP Status Request extension unbounded memory growth (CVE-2016-6304)\n=====================================================================\n\nSeverity: High\n\nA malicious client can send an excessively large OCSP Status Request extension. \nIf that client continually requests renegotiation, sending a large OCSP Status\nRequest extension each time, then there will be unbounded memory growth on the\nserver. This will eventually lead to a Denial Of Service attack through memory\nexhaustion. Servers with a default configuration are vulnerable even if they do\nnot support OCSP. Builds using the \"no-ocsp\" build time option are not affected. \n\nServers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default\nconfiguration, instead only if an application explicitly enables OCSP stapling\nsupport. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nSSL_peek() hang on empty record (CVE-2016-6305)\n===============================================\n\nSeverity: Moderate\n\nOpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an\nempty record. This could be exploited by a malicious peer in a Denial Of Service\nattack. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nSWEET32 Mitigation (CVE-2016-2183)\n==================================\n\nSeverity: Low\n\nSWEET32 (https://sweet32.info) is an attack on older block cipher algorithms\nthat use a block size of 64 bits. In mitigation for the SWEET32 attack DES based\nciphersuites have been moved from the HIGH cipherstring group to MEDIUM in\nOpenSSL 1.0.1 and OpenSSL 1.0.2.  OpenSSL 1.1.0 since release has had these\nciphersuites disabled by default. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 16th August 2016 by Karthikeyan\nBhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the\nOpenSSL development team. \n\nOOB write in MDC2_Update() (CVE-2016-6303)\n==========================================\n\nSeverity: Low\n\nAn overflow can occur in MDC2_Update() either if called directly or\nthrough the EVP_DigestUpdate() function using MDC2. If an attacker\nis able to supply very large amounts of input data after a previous\ncall to EVP_EncryptUpdate() with a partial block then a length check\ncan overflow resulting in a heap corruption. \n\nThe amount of data needed is comparable to SIZE_MAX which is impractical\non most platforms. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nMalformed SHA512 ticket DoS (CVE-2016-6302)\n===========================================\n\nSeverity: Low\n\nIf a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a\nDoS attack where a malformed ticket will result in an OOB read which will\nultimately crash. \n\nThe use of SHA512 in TLS session tickets is comparatively rare as it requires\na custom server callback and ticket lookup mechanism. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB write in BN_bn2dec() (CVE-2016-2182)\n========================================\n\nSeverity: Low\n\nThe function BN_bn2dec() does not check the return value of BN_div_word(). \nThis can cause an OOB write if an application uses this function with an\noverly large BIGNUM. This could be a problem if an overly large certificate\nor CRL is printed out from an untrusted source. TLS is not affected because\nrecord limits will reject an oversized certificate before it is parsed. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB read in TS_OBJ_print_bio() (CVE-2016-2180)\n==============================================\n\nSeverity: Low\n\nThe function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is\nthe total length the OID text representation would use and not the amount\nof data written. This will result in OOB reads when large OIDs are presented. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nPointer arithmetic undefined behaviour (CVE-2016-2177)\n======================================================\n\nSeverity: Low\n\nAvoid some undefined pointer arithmetic\n\nA common idiom in the codebase is to check limits in the following manner:\n\"p + len > limit\"\n\nWhere \"p\" points to some malloc'd data of SIZE bytes and\nlimit == p + SIZE\n\n\"len\" here could be from some externally supplied data (e.g. from a TLS\nmessage). \n\nThe rules of C pointer arithmetic are such that \"p + len\" is only well\ndefined where len <= SIZE. Therefore the above idiom is actually\nundefined behaviour. \n\nFor example this could cause problems if some malloc implementation\nprovides an address for \"p\" such that \"p + len\" actually overflows for\nvalues of len that are too big and therefore p + len < limit. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nConstant time flag not preserved in DSA signing (CVE-2016-2178)\n===============================================================\n\nSeverity: Low\n\nOperations in the DSA signing algorithm should run in constant time in order to\navoid side channel attacks. A flaw in the OpenSSL DSA implementation means that\na non-constant time codepath is followed for certain operations. This has been\ndemonstrated through a cache-timing attack to be sufficient for an attacker to\nrecover the private DSA key. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto\nUniversity), Billy Brumley (Tampere University of Technology), and Yuval Yarom\n(The University of Adelaide and NICTA). The fix was developed by César Pereida. \n\nDTLS buffered message DoS (CVE-2016-2179)\n=========================================\n\nSeverity: Low\n\nIn a DTLS connection where handshake messages are delivered out-of-order those\nmessages that OpenSSL is not yet ready to process will be buffered for later\nuse. Under certain circumstances, a flaw in the logic means that those messages\ndo not get removed from the buffer even though the handshake has been completed. \nAn attacker could force up to approx. 15 messages to remain in the buffer when\nthey are no longer required. These messages will be cleared when the DTLS\nconnection is closed. The default maximum size for a message is 100k. Therefore\nthe attacker could force an additional 1500k to be consumed per connection. By\nopening many simulataneous connections an attacker could cause a DoS attack\nthrough memory exhaustion. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was\ndeveloped by Matt Caswell of the OpenSSL development team. \n\nDTLS replay protection DoS (CVE-2016-2181)\n==========================================\n\nSeverity: Low\n\nA flaw in the DTLS replay attack protection mechanism means that records that\narrive for future epochs update the replay protection \"window\" before the MAC\nfor the record has been validated. This could be exploited by an attacker by\nsending a record for the next epoch (which does not have to decrypt or have a\nvalid MAC), with a very large sequence number. This means that all subsequent\nlegitimate packets are dropped causing a denial of service for a specific\nDTLS connection. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. \nThe fix was developed by Matt Caswell of the OpenSSL development team. \n\nCertificate message OOB reads (CVE-2016-6306)\n=============================================\n\nSeverity: Low\n\nIn OpenSSL 1.0.2 and earlier some missing message length checks can result in\nOOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical\nDoS risk but this has not been observed in practice on common platforms. \n\nThe messages affected are client certificate, client certificate request and\nserver certificate. As a result the attack can only be performed against\na client or a server which enables client authentication. \n\nOpenSSL 1.1.0 is not affected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in tls_get_message_header() (CVE-2016-6307)\n==========================================================================\n\nSeverity: Low\n\nA TLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. This could lead\nto a Denial of Service through memory exhaustion. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect DTLS users. \n\nOpenSSL 1.1.0 TLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)\n=============================================================================\n\nSeverity: Low\n\nThis issue is very similar to CVE-2016-6307. The underlying defect is different\nbut the security analysis and impacts are the same except that it impacts DTLS. \n\nA DTLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. This could lead\nto a Denial of Service through memory exhaustion. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect TLS users. \n\nOpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/policies/releasestrat.html), support for OpenSSL\nversion 1.0.1 will cease on 31st December 2016. No security updates for that\nversion will be provided after that date. Users of 1.0.1 are advised to\nupgrade. \n\nSupport for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those\nversions are no longer receiving security updates. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv/20160922.txt\n\nNote: the online version of the advisory may be updated with additional details\nover time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/policies/secpolicy.html\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "BID",
            id: "92987",
         },
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-2179",
            trust: 3.3,
         },
         {
            db: "BID",
            id: "92987",
            trust: 2,
         },
         {
            db: "SECTRACK",
            id: "1036689",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-21",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-20",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-16",
            trust: 1.7,
         },
         {
            db: "JUNIPER",
            id: "JSA10759",
            trust: 1.7,
         },
         {
            db: "PULSESECURE",
            id: "SA40312",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU98667810",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-2179",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138870",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138817",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138820",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138826",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169633",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "BID",
            id: "92987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   id: "VAR-201609-0031",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.43269937900000005,
   },
   last_update_date: "2024-11-23T21:20:06.552000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sa-20160927-openssl",
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl",
         },
         {
            title: "1995039",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            title: "NV17-001",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv17-001.html",
         },
         {
            title: "OpenSSL 1.0.2 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.2-notes.html",
         },
         {
            title: "OpenSSL 1.0.1 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.1-notes.html",
         },
         {
            title: "Fix DTLS buffered message DoS attack",
            trust: 0.8,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            title: "Oracle Linux Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            title: "Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            title: "SA40312",
            trust: 0.8,
            url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
         },
         {
            title: "SA132",
            trust: 0.8,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            title: "JSA10759",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
         },
         {
            title: "Splunk Enterprise 6.4.5 addresses multiple vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPUE",
         },
         {
            title: "Splunk Enterprise 6.5.1 addresses multiple OpenSSL vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPSV",
         },
         {
            title: "TNS-2016-16",
            trust: 0.8,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            title: "OpenSSL Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=63926",
         },
         {
            title: "Red Hat: Important: openssl security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20161940 - Security Advisory",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-2179",
         },
         {
            title: "Red Hat: CVE-2016-2179",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-2179",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-2",
         },
         {
            title: "Amazon Linux AMI: ALAS-2016-755",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-755",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-23] openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-23",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-24] lib32-openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-24",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Tenable Security Advisories: [R7] Nessus 6.9 Fixes Multiple Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-16",
         },
         {
            title: "Symantec Security Advisories: SA132 : OpenSSL Vulnerabilities 22-Sep-2016 and 26-Sep-2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=1e6dcaf5dac6ef96a7d917a8c1393040",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160927-openssl",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=ac5af5dd99788925425f5747ec672707",
         },
         {
            title: "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-20",
         },
         {
            title: "Tenable Security Advisories: [R2] LCE 4.8.2 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-21",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=586e6062440cdd312211d748e028164e",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6839c4d3fd328571c675c335d58b5591",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Forcepoint Security Advisories: CVE-2016-2180 to -2183, -6302 to -6309, -2179, -7052 OpenSSL Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=a9dd8a175d084c7432b7ad47715ac50c",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=a31bff03e9909229fd67996884614fdf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d",
         },
         {
            title: "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=21c0efa2643d707e2f50a501209eb75c",
         },
         {
            title: "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=13f3551b67d913fba90df4b2c0dae0bf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4019ca77f50c7a34e4d97833e6f3321e",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "CVE Scanning of Alpine base images using Multi Stage builds in Docker 17.05\nSummary",
            trust: 0.1,
            url: "https://github.com/tomwillfixit/alpine-cvecheck ",
         },
         {
            title: "OpenSSL-CVE-lib",
            trust: 0.1,
            url: "https://github.com/chnzzh/OpenSSL-CVE-lib ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            trust: 1.8,
            url: "http://rhn.redhat.com/errata/rhsa-2016-1940.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/92987",
         },
         {
            trust: 1.7,
            url: "http://www.splunk.com/view/sp-caaapue",
         },
         {
            trust: 1.7,
            url: "http://www.splunk.com/view/sp-caaapsv",
         },
         {
            trust: 1.7,
            url: "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40312",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10759",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1036689",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-21",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-20",
         },
         {
            trust: 1.7,
            url: "https://security.freebsd.org/advisories/freebsd-sa-16:26.openssl.asc",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
         },
         {
            trust: 1.7,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03856en_us",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d",
         },
         {
            trust: 0.9,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160927-openssl",
         },
         {
            trust: 0.9,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=f5c7f5dfbaf0d2f7d946d0fe86f08e6bcb36ed0d",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2179",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu98667810/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2179",
         },
         {
            trust: 0.8,
            url: "http://www.bizmobile.co.jp/news_02.php?id=4069&nc=1",
         },
         {
            trust: 0.6,
            url: "https://www.openssl.org/news/vulnerabilities.html#y2017",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2182",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2178",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6302",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2179",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2177",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2181",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6306",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6304",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2180",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6303",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2183",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc",
         },
         {
            trust: 0.3,
            url: "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-openssl-affect-ibm-worklight-and-ibm-mobilefirst-platform-foundation-2/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024394",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1024401",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024648",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021643",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2016-10-07.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992348",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992898",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993061",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993856",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993875",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995392",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995393",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995691",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995886",
         },
         {
            trust: 0.2,
            url: "https://www.openssl.org/news/secadv/20160922.txt",
         },
         {
            trust: 0.2,
            url: "http://www.ubuntu.com/usn/usn-3087-1",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=48598",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/3087-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2180",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6306",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2181",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6304",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2179",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2182",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6302",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.37",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.21",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.38",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.5",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1626883",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-3087-2",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6308",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6305",
         },
         {
            trust: 0.1,
            url: "https://sweet32.info)",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6307",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "BID",
            id: "92987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            db: "BID",
            id: "92987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-16T00:00:00",
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            date: "2016-06-30T00:00:00",
            db: "BID",
            id: "92987",
         },
         {
            date: "2016-09-21T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            date: "2016-09-27T19:32:00",
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            date: "2016-09-22T22:22:00",
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            date: "2016-09-22T22:25:00",
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            date: "2016-09-23T19:19:00",
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            date: "2016-09-22T12:12:12",
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            date: "2016-08-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            date: "2016-09-16T05:59:00.143000",
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2016-2179",
         },
         {
            date: "2018-01-18T12:00:00",
            db: "BID",
            id: "92987",
         },
         {
            date: "2017-10-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
         {
            date: "2024-11-21T02:47:58.363000",
            db: "NVD",
            id: "CVE-2016-2179",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  DTLS Service disruption in implementations  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004778",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-103",
         },
      ],
      trust: 0.6,
   },
}

var-201312-0175
Vulnerability from variot

IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote attackers to inject links and trigger unintended navigation or actions via unspecified vectors. Attackers can exploit this issue to inject arbitrary links to different pages within the application. This may allow an attacker to perform phishing attacks by presenting false information that may appear to be legitimate application pages. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to inject links and trigger users to navigate to malicious websites or perform malicious actions

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0175",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64447",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5411",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2013-5411",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-65413",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5411",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5411",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-447",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65413",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote attackers to inject links and trigger unintended navigation or actions via unspecified vectors. \nAttackers can exploit this issue to inject arbitrary links to different pages within the application. This may allow an attacker to perform phishing attacks by presenting false information that may appear to be legitimate application pages. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to inject links and trigger users to navigate to malicious websites or perform malicious actions",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "BID",
            id: "64447",
         },
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5411",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "20135411",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "87360",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC96059",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "64447",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-65413",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            db: "BID",
            id: "64447",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   id: "VAR-201312-0175",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:46:09.021000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC96059",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96059",
         },
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96059",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87360",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5411",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5411",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87360",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            db: "BID",
            id: "64447",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64447",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            date: "2013-12-21T14:22:56.973000",
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65413",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64447",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
         {
            date: "2024-11-21T01:57:26.017000",
            db: "NVD",
            id: "CVE-2013-5411",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Link insertion vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005676",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-447",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0123
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path. An attacker can exploit this issue to gain unauthorized access to the affected application. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker can exploit this vulnerability to hijack a session by modifying the cookie path

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0123",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60984",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0456",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0456",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "VHN-60458",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0456",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0456",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-048",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60458",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to hijack sessions via a modified cookie path. \nAn attacker can exploit this issue to gain unauthorized access to the affected application. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker can exploit this vulnerability to hijack a session by modifying the cookie path",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "BID",
            id: "60984",
         },
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0456",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "80972",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60984",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60458",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            db: "BID",
            id: "60984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   id: "VAR-201307-0123",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:16:03.573000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/80972",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0456",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0456",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/80972",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            db: "BID",
            id: "60984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            db: "BID",
            id: "60984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            date: "2013-06-28T00:00:00",
            db: "BID",
            id: "60984",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            date: "2013-07-03T13:54:30.950000",
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60458",
         },
         {
            date: "2013-06-28T00:00:00",
            db: "BID",
            id: "60984",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
         {
            date: "2017-08-29T01:33:01.807000",
            db: "NVD",
            id: "CVE-2013-0456",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to session hijacking",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003193",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-048",
         },
      ],
      trust: 0.6,
   },
}

var-201406-0117
Vulnerability from variot

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. An attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. OpenSSL prior to 0.9.8za, 1.0.0m, and 1.0.1h are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201407-05


                                        http://security.gentoo.org/

Severity: High Title: OpenSSL: Multiple vulnerabilities Date: July 27, 2014 Bugs: #512506 ID: 201407-05


Synopsis

Multiple vulnerabilities have been found in OpenSSL, possibly allowing remote attackers to execute arbitrary code.

Resolution

All OpenSSL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1h-r1"

References

[ 1 ] CVE-2010-5298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298 [ 2 ] CVE-2014-0195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195 [ 3 ] CVE-2014-0198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198 [ 4 ] CVE-2014-0221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221 [ 5 ] CVE-2014-0224 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224 [ 6 ] CVE-2014-3470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470 [ 7 ] OpenSSL Security Advisory [05 Jun 2014] http://www.openssl.org/news/secadv_20140605.txt

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201407-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . 7) - x86_64

HP Systems Insight Manager v7.3 Hotfix kit HP Systems Insight Manager v7.2 Hotfix kit

http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

NOTE: No reboot of the system is required after applying the HP SIM Hotfix kit.

The attack can only be performed between a vulnerable client and server.

Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC.

The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi.

DTLS recursion flaw (CVE-2014-0221)

By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack.

Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. This issue was reported to OpenSSL on 9th May 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

Thanks to Jüri Aedla for reporting this issue. This issue was reported to OpenSSL on 23rd April 2014 via HP ZDI.

The fix was developed by Stephen Henson of the OpenSSL core team. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.

This issue was reported in public. The fix was developed by Matt Caswell of the OpenSSL development team.

SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)

A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.

This issue was reported in public.

Thanks to Felix Gröbert and Ivan Fratrić at Google for discovering this issue. This issue was reported to OpenSSL on 28th May 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

Other issues

OpenSSL 1.0.0m and OpenSSL 0.9.8za also contain a fix for CVE-2014-0076: Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" Reported by Yuval Yarom and Naomi Benger. This issue was previously fixed in OpenSSL 1.0.1g.

References

URL for this Security Advisory: http://www.openssl.org/news/secadv_20140605.txt

Note: the online version of the advisory may be updated with additional details over time.

Release Date: 2014-06-12 Last Updated: 2014-06-12

Potential Security Impact: Remote Denial of Service (DoS), code execution, security restriction bypass, disclosure of information, or unauthorized access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), execute code, bypass security restrictions, disclose information, or allow unauthorized access.

References:

CVE-2014-0076 Remote Denial of Service (DoS) CVE-2014-0195 Remote Unauthorized Access CVE-2014-0221 Remote Denial of Service (DoS) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information CVE-2014-3470 Remote Code Execution or Unauthorized Access SSRT101590, SSRT101596

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before 0.9.8za

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to resolve these vulnerabilities. The updates are available from the following location using ftp:

ftp://srt03046:Secure12@ftp.usa.hp.com

User name: srt03046 Password: Secure12 ( NOTE: Case sensitive)

HP-UX Release HP-UX OpenSSL version

B.11.11 (11i v1) A.00.09.08za.001_HP-UX_B.11.11_32+64.depot

B.11.23 (11i v2) A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install OpenSSL A.00.09.08za or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08za.001 or subsequent

HP-UX B.11.23

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08za.002 or subsequent

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08za.003 or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 12 June 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Summary

VMware product updates address OpenSSL security vulnerabilities. Problem Description

a.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)

  has assigned the names CVE-2014-0224, CVE-2014-0198, 
  CVE-2010-5298, CVE-2014-3470, CVE-2014-0221 and CVE-2014-0195 to
  these issues. The most important of these issues is 
  CVE-2014-0224.

  CVE-2014-0198, CVE-2010-5298 and CVE-2014-3470 are considered to
  be of moderate severity. Exploitation is highly unlikely or is
  mitigated due to the application configuration.

  CVE-2014-0221 and CVE-2014-0195, which are listed in the OpenSSL 
  Security Advisory (see Reference section below), do not affect
  any VMware products. For readability
  the affected products have been split into 3 tables below, 
  based on the different client-server configurations and
  deployment scenarios. Applying these patches to 
  affected servers will mitigate the affected clients (See Table 1
  below). can be mitigated by using a secure network such as 
  VPN (see Table 2 below).

  Clients and servers that are deployed on an isolated network are
  less exposed to CVE-2014-0224 (see Table 3 below). The affected
  products are typically deployed to communicate over the
  management network.

  RECOMMENDATIONS

  VMware recommends customers evaluate and deploy patches for
  affected Servers in Table 1 below as these patches become
  available. Patching these servers will remove the ability to
  exploit the vulnerability described in CVE-2014-0224 on both
  clients and servers. VMware recommends customers consider 
  applying patches to products listed in Table 2 & 3 as required.

  Column 4 of the following tables lists the action required to
  remediate the vulnerability in each release, if a solution is
  available.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  ESXi                            5.5       ESXi     ESXi550-
                                                     201406401-SG

  Big Data Extensions             1.1                patch pending 
  Charge Back Manager             2.6                patch pending

  Horizon Workspace Server 
  GATEWAY                         1.8.1              patch pending 
  Horizon Workspace Server 
  GATEWAY                         1.5                patch pending

  Horizon Workspace Server 
  DATA                            1.8.1              patch pending

  Horizon Mirage Edge Gateway     4.4.2              patch pending 
  Horizon View                    5.3.1              patch pending

  Horizon View Feature Pack       5.3 SP2            patch pending

  NSX for Multi-Hypervisor        4.1.2              patch pending 
  NSX for Multi-Hypervisor        4.0.3              patch pending 
  NSX for vSphere                 6.0.4              patch pending 
  NVP                             3.2.2              patch pending 
  vCAC                            6.0.1              patch pending

  vCloud Networking and Security  5.5.2          patch pending 
  vCloud Networking and Security  5.1.2          patch pending

  vFabric Web Server              5.3.4              patch pending

  vCHS - DPS-Data Protection      2.0                patch pending 
  Service

  Table 2
  ========
  Affected clients running a vulnerable version of OpenSSL 0.9.8 
  or 1.0.1 and communicating over an untrusted network.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  vCSA                            5.5                patch pending 
  vCSA                            5.1                patch pending 
  vCSA                            5.0                patch pending


  ESXi                            5.1       ESXi     patch pending 
  ESXi                            5.0       ESXi     patch pending

  Workstation                     10.0.2    any      patch pending 
  Workstation                     9.0.3     any      patch pending 
  Fusion                          6.x       OSX      patch pending 
  Fusion                          5.x       OSX      patch pending 
  Player                          10.0.2    any      patch pending 
  Player                          9.0.3     any      patch pending

  Chargeback Manager              2.5.x              patch pending

  Horizon Workspace Client for    1.8.1    OSX       patch pending 
  Mac
  Horizon Workspace Client for    1.5      OSX       patch pending 
  Mac
  Horizon Workspace Client for    1.8.1    Windows   patch pending 
  Windows       
  Horizon Workspace Client for    1.5      Windows   patch pending

  OVF Tool                        3.5.1              patch pending 
  OVF Tool                        3.0.1              patch pending

  vCenter Operations Manager      5.8.1              patch pending

  vCenter Support Assistant       5.5.0              patch pending 
  vCenter Support Assistant       5.5.1              patch pending

  vCD                             5.1.2              patch pending    
  vCD                             5.1.3              patch pending 
  vCD                             5.5.1.1            patch pending 
  vCenter Site Recovery Manager   5.0.3.1            patch pending

  Table 3
  =======
  The following table lists all affected clients running a
  vulnerable version of OpenSSL 0.9.8 or 1.0.1 and communicating
  over an untrusted network.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  vCenter Server                  5.5       any      patch pending
  vCenter Server                  5.1       any      patch pending
  vCenter Server                  5.0       any      patch pending

  Update Manager                  5.5       Windows  patch pending
  Update Manager                  5.1       Windows  patch pending
  Update Manager                  5.0       Windows  patch pending

  Config Manager (VCM)            5.6                patch pending

  Horizon View Client             5.3.1              patch pending 
  Horizon View Client             4.x                patch pending
  Horizon Workspace               1.8.1              patch pending 
  Horizon Workspace               1.5                patch pending


  ITBM Standard                   1.0.1              patch pending 
  ITBM Standard                   1.0                patch pending

  Studio                          2.6.0.0            patch pending

  Usage Meter                     3.3                patch pending 
  vCenter Chargeback Manager      2.6                patch pending 
  vCenter Converter Standalone    5.5                patch pending 
  vCenter Converter Standalone    5.1                patch pending 
  vCD (VCHS)                      5.6.2              patch pending

  vCenter Site Recovery Manager   5.5.1              patch pending 
  vCenter Site Recovery Manager   5.1.1              patch pending

  vFabric Application Director    5.2.0              patch pending 
  vFabric Application Director    5.0.0              patch pending 
  View Client                     5.3.1              patch pending 
  View Client                     4.x                patch pending
  VIX API                         5.5                patch pending 
  VIX API                         1.12               patch pending

  vMA (Management Assistant)      5.1.0.1            patch pending


  VMware Data Recovery            2.0.3              patch pending

  VMware vSphere CLI              5.5                patch pending

  vSphere Replication             5.5.1              patch pending 
  vSphere Replication             5.6                patch pending 
  vSphere SDK for Perl            5.5                patch pending 
  vSphere Storage Appliance       5.5.1              patch pending 
  vSphere Storage Appliance       5.1.3              patch pending 
  vSphere Support Assistant       5.5.1              patch pending 
  vSphere Support Assistant       5.5.0              patch pending
  vSphere Virtual Disk            5.5                patch pending 
  Development Kit                  
  vSphere Virtual Disk            5.1                patch pending 
  Development Kit
  vSphere Virtual Disk            5.0                patch pending 
  Development Kit
  1. Solution

ESXi 5.5


Download: https://www.vmware.com/patchmgr/download.portal

Release Notes and Remediation Instructions: http://kb.vmware.com/kb/2077359

  1. Change Log

2014-06-10 VMSA-2014-0006 Initial security advisory in conjunction with the release of ESXi 5.5 updates on 2014-06-10


  1. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories http://www.vmware.com/security/advisories

VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html

Twitter https://twitter.com/VMwareSRC

Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2014:0625-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0625.html Issue date: 2014-06-05 CVE Names: CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)

Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433

A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. A remote attacker could possibly use this flaw to execute arbitrary code on a DTLS client or server. (CVE-2014-0195)

Multiple flaws were found in the way OpenSSL handled read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or server using OpenSSL could crash or unexpectedly drop connections when processing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221)

A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)

Red Hat would like to thank the OpenSSL project for reporting these issues. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195, Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix Gröbert and Ivan Fratrić of Google as the original reporters of CVE-2014-3470.

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free 1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() 1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability 1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake 1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment 1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.14.ppc.rpm openssl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.14.s390.rpm openssl-1.0.1e-16.el6_5.14.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-devel-1.0.1e-16.el6_5.14.s390.rpm openssl-devel-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-static-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-perl-1.0.1e-16.el6_5.14.s390x.rpm openssl-static-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2010-5298.html https://www.redhat.com/security/data/cve/CVE-2014-0195.html https://www.redhat.com/security/data/cve/CVE-2014-0198.html https://www.redhat.com/security/data/cve/CVE-2014-0221.html https://www.redhat.com/security/data/cve/CVE-2014-0224.html https://www.redhat.com/security/data/cve/CVE-2014-3470.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/articles/904433 https://access.redhat.com/site/solutions/905793

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB pJJhdOUzRUL8R2haDM4xrsk= =hZF8 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. ============================================================================ Ubuntu Security Notice USN-2232-3 June 23, 2014

openssl regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 13.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

USN-2232-1 introduced a regression in OpenSSL. The upstream fix for CVE-2014-0224 caused a regression for certain applications that use renegotiation, such as PostgreSQL. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0195) Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. (CVE-2014-0224) Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled anonymous ECDH ciphersuites. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-3470)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.4

Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.6

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.16

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.19

After a standard system update you need to reboot your computer to make all the necessary changes. Corrected: 2014-06-05 12:32:38 UTC (stable/10, 10.0-STABLE) 2014-06-05 12:33:23 UTC (releng/10.0, 10.0-RELEASE-p5) 2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1) 2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1-p2) 2014-06-05 12:33:23 UTC (releng/9.2, 9.2-RELEASE-p8) 2014-06-05 12:33:23 UTC (releng/9.1, 9.1-RELEASE-p15) 2014-06-05 12:32:38 UTC (stable/8, 8.4-STABLE) 2014-06-05 12:33:23 UTC (releng/8.4, 8.4-RELEASE-p12) CVE Name: CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-3470]

III. [CVE-2014-3470]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch.asc

gpg --verify openssl-10.patch.asc

[FreeBSD 9.x and 8.x]

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch.asc

gpg --verify openssl-9.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r267103 releng/8.4/ r267104 stable/9/ r267106 releng/9.1/ r267104 releng/9.2/ r267104 stable/10/ r267103 releng/10.0/ r267104


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII.

CVE-2014-0221

Imre Rad discovered the processing of DTLS hello packets is 
susceptible to denial of service.

Additional information can be found at http://www.openssl.org/news/secadv_20140605.txt

For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u10. You can use the tool checkrestart from the package debian-goodies to detect affected programs or reboot your system. There's also a forthcoming security update for the Linux kernel later the day (CVE-2014-3153), so you need to reboot anyway. Perfect timing, isn't it?

For the unstable distribution (sid), these problems will be fixed soon. HP System Management Homepage versions 7.3.2 and earlier for Linux and Windows. HP System Management Homepage v7.2.4.1 is available for Windows 2003 only.

HP System Management Homepage v7.2.4.1 for Windows x86: http://www.hp.com/swpublishing/MTX-d775367b0a28449ca05660778b ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98702

HP System Management Homepage v7.2.4.1 for Windows x64: http://www.hp.com/swpublishing/MTX-3a7aa5e233904ebe847a5e1555 ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98704

HP System Management Homepage v7.3.3.1 for Windows x86: http://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05 ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98696

HP System Management Homepage v7.3.3.1 for Windows x64: http://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98698

HP System Management Homepage v7.3.3.1 for Linux x86: http://www.hp.com/swpublishing/MTX-511c3e0b2f6f4f6bbc796fc619 ftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1980463820/v98694

HP System Management Homepage v7.3.3.1 for Linux x64: http://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93 ftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1507410135/v98693

NOTE: HP System Management Homepage v7.3.3.1 for Linux x86 still contains OpenSSL v1.0.0d. As long as all other products which SMH V7.3.3.1 for Linux x86 communicates with have been upgraded to the latest versions, it will not be vulnerable to the exploits described in CVE-2014-0224. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

APPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update 2014-004

OS X Mavericks 10.9.5 and Security Update 2014-004 are now available and address the following:

apache_mod_php Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in PHP 5.4.24 Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30 CVE-ID CVE-2013-7345 CVE-2014-0185 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-3981 CVE-2014-4049

Bluetooth Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4390 : Ian Beer of Google Project Zero

CoreGraphics Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

CoreGraphics Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

Foundation Available for: OS X Mavericks 10.9 to 10.9.4 Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4393 : Apple

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-4394 : Ian Beer of Google Project Zero CVE-2014-4395 : Ian Beer of Google Project Zero CVE-2014-4396 : Ian Beer of Google Project Zero CVE-2014-4397 : Ian Beer of Google Project Zero CVE-2014-4398 : Ian Beer of Google Project Zero CVE-2014-4399 : Ian Beer of Google Project Zero CVE-2014-4400 : Ian Beer of Google Project Zero CVE-2014-4401 : Ian Beer of Google Project Zero CVE-2014-4416 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4376 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4402 : Ian Beer of Google Project Zero

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4379 : Ian Beer of Google Project Zero

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4388 : @PanguTeam

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses. CVE-ID CVE-2014-4403 : Ian Beer of Google Project Zero

Libnotify Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking CVE-ID CVE-2014-4381 : Ian Beer of Google Project Zero

OpenSSL Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. CVE-ID CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

ruby Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A remote attacker may be able to cause arbitrary code execution Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6 CVE-ID CVE-2014-2525

Note: OS X Mavericks 10.9.5 includes the security content of Safari 7.0.6: http://support.apple.com/kb/HT6367

OS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJUGkP0AAoJEBcWfLTuOo7tygQP/1vHYXtWy6492Tjj6ycymWa+ Ct0eCCBU/AUi5ODNDeV9ddWkuFeXKbgQSHoPU19IPcIBAKnYUupVJSJ/cEHfSthh CiROjJw8Bt8comn04BgggHieLveN1xQCXQDcO29kBIpQr394XKS0lNXP//Z0oG5V sCnEDPz/0R92mwT5XkKD9WC7G/WjybS5V7BjEbdzDOn4qdTVje05xI5pof+fkeQ1 hFHo7uTCDkSzLH2YxrQHifNVyItz8AgnNHwH7zc6XmNtiNFkiFP/KU6BYyr8WiTQ Jb3pyLB/Xvmbd0kuETnDNvV0oJc88G38a++xZPnuM7zQrW/TQkkKQpiqKtYAiJuw ZhUoky620/7HULegcYtsTyuDFyEN6whdSmHLFCJzk2oZXZ7MPA8ywCFB8Y79rohW 5MTe/zVUSxxYBgVXpkmhPwXYSTINeUJGJA1RQtXhC2Hh6O2jeqJP2H0hTmgsCBRA 3X/2CGoyAAgoKTJwgXk07tBbJWf+wQwAvUN9L1Yph+uOvvUzqFt8LNEGw9jVPsZl QHcSEW/Ef/HK/OLwVZiPqse6lRJAdRZl5//vm4408jnXfJCy6KnvxcsO4Z1yTyoP kCXdWlSLBiidcRRWBfoQBSC3gANcx9a56ItWieEvJrdNOiyhb+gqEk7XraOlb/gf k4w2RKNm0Fv+kdNoFAnd =gpVc -----END PGP SIGNATURE-----

.

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c (CVE-2014-8275).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).

The updated packages have been upgraded to the 1.0.1m version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0117",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "storage",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 1.1,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "linux enterprise workstation extension",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "*",
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "42.1",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "linux enterprise software development kit",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "fedora",
            scope: null,
            trust: 0.8,
            vendor: "fedora",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "3.0 (ibm pureapplication system and  xen)",
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "3.0 (vmware)",
         },
         {
            model: "hardware management console",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7 release 7.6.0 sp3",
         },
         {
            model: "hardware management console",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7 release 7.7.0 sp3",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 10.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 10.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "standard/advanced edition 11.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "standard/advanced edition 11.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 9.7",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 9.7",
         },
         {
            model: "mobile messaging & m2m",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "client pack (linux and  windows for platforms  eclipse paho mqtt c client library ) of  support pac ma9b",
         },
         {
            model: "sdk,",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "for node.js 1.1.0.3",
         },
         {
            model: "security access manager for mobile the appliance",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "security access manager for web the appliance",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security access manager for web the appliance",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "smartcloud orchestrator",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "smartcloud orchestrator",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3 fp1",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.1 for ibm provided software virtual appliance",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3 fp1",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "4.1.1 (linux-ix86 and  linux-s390)",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.4.0 fp07",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.5.0 fp04",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.5.1 fp05",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.6.0 fp03",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 9.1.0 fp01",
         },
         {
            model: "tivoli workload scheduler",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 9.2.0 ga level",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7.1 (linux and  windows for platforms  paho mqtt c client library )",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7.5 (linux and  windows for platforms  paho mqtt c client library )",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for hp nonstop server 5.3.1",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.2",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.3",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.4",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.8 thats all  0.9.8za",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0 thats all  1.0.0m",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1 thats all  1.0.1h",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.7.5",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.8.5",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.9 to  10.9.4",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.7.5",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.63",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.71",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.0",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.1",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "3.2.24",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.0.26",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.1.34",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.2.26",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.3.14",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "6",
         },
         {
            model: "storage",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1",
         },
         {
            model: "l20/300",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "lto6 drive",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "lx/30a",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "integrated system ha database ready",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "symfoware",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "analytics server",
         },
         {
            model: "symfoware",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "server",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "one-x mobile sip for ios",
            scope: "eq",
            trust: 0.6,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "chrome for android",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.141",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v210.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "cp1543-1",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "point software check point security gateway r71",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "9.1-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "34.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "release-p4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "firepass",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "tivoli workload scheduler distributed ga level",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2.0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.2",
         },
         {
            model: "db2 workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "tivoli workload scheduler distributed fp05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "tivoli workload scheduler distributed fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.5",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "intelligencecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "big-iq cloud",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "enterprise manager",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "3.0",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-iq security",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.2",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.9",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "enterprise manager",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "3.1",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "key",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "worklight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "operations orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.05",
         },
         {
            model: "firepass",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "9.3-beta1-p2",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "db2 connect unlimited advanced edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.4",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.5",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.2",
         },
         {
            model: "db2 connect enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "8.4-release-p12",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "netcool/system service monitor fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.014",
         },
         {
            model: "bbm for android",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "0",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.6.0",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "operations orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.02",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.1",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "communicator for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "db2 connect application server advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.2-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "db2 connect application server edition fp7",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.2",
         },
         {
            model: "operations orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.7.4",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0.1650.59",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.1",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6",
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "worklight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "9.2-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "db2 connect application server advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "freedome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "simatic wincc oa p002",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.12",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "db2 advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "db2 express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v19.7",
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "10.0-release-p5",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "collaboration services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v310.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "db2 connect unlimited edition for system i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "point software check point security gateway r77",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.29",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "big-iq device",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.1",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "point software check point security gateway r70",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infosphere balanced warehouse c4000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "flare experience for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.2",
         },
         {
            model: "communicator for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "infosphere balanced warehouse d5100",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "enterprise server x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "point software check point security gateway r75",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.3",
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "infosphere balanced warehouse c3000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "operations orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.03",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "puredata system for operational analytics a1791",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "icewall sso certd r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "ape",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v110.1",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "20",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli workload scheduler distributed fp07",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "tivoli workload scheduler distributed fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "bbm for android",
            scope: "ne",
            trust: 0.3,
            vendor: "rim",
            version: "2.2.1.40",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "one-x mobile ces for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "11.00",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "9.20",
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webapp secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "88704.76.0",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.3",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ctpos 6.6r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "cognos planning fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.2",
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "blackberry link",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "1.2",
         },
         {
            model: "one-x mobile ces for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.1",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "big-iq security",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.12",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "operations orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.0",
         },
         {
            model: "db2 connect application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "9.1-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "stunnel",
            scope: "ne",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.02",
         },
         {
            model: "big-iq cloud",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.6",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux es",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "one-x mobile for blackberry",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.5",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "firepass",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "7.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.4",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0.1025308",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.99",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.9",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "85704.76.0",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "safe profile",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "db2 advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.4",
         },
         {
            model: "big-iq security",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.3",
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "db2 developer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.7",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "idp series 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "db2 express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "infosphere master data management server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "watson explorer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.4",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.3",
         },
         {
            model: "enterprise manager",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.1",
         },
         {
            model: "db2 purescale feature",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "big-iq security",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "db2 express edition fp7",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "ftp server",
            scope: "ne",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.3",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "57100",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "cognos business intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "point software check point security gateway r76",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "wincc oa 3.12-p001-3.12-p008",
            scope: null,
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.6",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x mobile lite for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "big-iq cloud",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10500",
         },
         {
            model: "flare experience for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1.3",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "db2 workgroup server edition fp7",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "9.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.3",
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x1.0.1",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "db2 connect unlimited advanced edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6.2",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "one-x mobile lite for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.4",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "db2 connect enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77009.7",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "vdi communicator",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp series",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.2",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.8",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "icewall sso dfw certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ctpos 6.6r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0",
         },
         {
            model: "enterprise manager",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.4",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "cp1543-1",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.1.25",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.1",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "enterprise manager",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "3.1.1",
         },
         {
            model: "s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v39.7",
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.00",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.8",
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-iq device",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "11.16",
         },
         {
            model: "enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "watson explorer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "one-x communicator for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "x2.0.10",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "20500",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "db2 connect unlimited edition for system i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "db2 connect unlimited edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.1",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "communicator for android",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v29.7",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "db2 connect application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "arx",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.01",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "tivoli network manager ip edition fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.94",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.166",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-iq cloud",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "one-x communicator for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.6",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "db2 enterprise server edition fp7",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "db2 connect unlimited edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "enterprise linux ws",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "client applications",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "project openssl 0.9.8za",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "35.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "db2 workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.3-beta1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "67898",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:fedoraproject:fedora",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:api_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:hardware_management_console",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:infosphere_master_data_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:initiate_master_data_service",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:mobile_messaging%26m2m",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:java_sdk",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:ibm:security_access_manager_for_mobile_appliance",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:ibm:security_access_manager_for_web_appliance",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:smartcloud_orchestrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:smartcloud_provisioning",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_management_framework",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_workload_scheduler",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:websphere_mq",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_composite_application_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:virtualization_secure_global_desktop",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:vm_virtualbox",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:redhat:storage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:l20_300",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:lto6_drive",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:lx_30a",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:integrated_system_ha_database_ready",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:symfoware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
      ],
      trust: 0.5,
   },
   cve: "CVE-2014-3470",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3470",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3470",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-3470",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3470",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker may exploit this issue to crash the application, resulting  in denial-of-service conditions. \nOpenSSL prior to 0.9.8za, 1.0.0m, and 1.0.1h are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201407-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: July 27, 2014\n     Bugs: #512506\n       ID: 201407-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, possibly allowing\nremote attackers to execute arbitrary code. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1h-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-5298\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298\n[ 2 ] CVE-2014-0195\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195\n[ 3 ] CVE-2014-0198\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198\n[ 4 ] CVE-2014-0221\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221\n[ 5 ] CVE-2014-0224\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224\n[ 6 ] CVE-2014-3470\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470\n[ 7 ] OpenSSL Security Advisory [05 Jun 2014]\n      http://www.openssl.org/news/secadv_20140605.txt\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201407-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. 7) - x86_64\n\n3. \n\nHP Systems Insight Manager v7.3 Hotfix kit\nHP Systems Insight Manager v7.2 Hotfix kit\n\nhttp://h18013.www1.hp.com/products/servers/management/hpsim/download.html\n\nNOTE: No reboot of the system is required after applying the HP SIM Hotfix\nkit. \n\nThe attack can only be performed between a vulnerable client *and*\nserver. \n\nThanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and\nresearching this issue.  This issue was reported to OpenSSL on 1st May\n2014 via JPCERT/CC. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team partly based\non an original patch from KIKUCHI Masashi. \n\nDTLS recursion flaw (CVE-2014-0221)\n====================================\n\nBy sending an invalid DTLS handshake to an OpenSSL DTLS client the code\ncan be made to recurse eventually crashing in a DoS attack. \n\nThanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.  This\nissue was reported to OpenSSL on 9th May 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nThanks to Jüri Aedla for reporting this issue.  This issue was\nreported to OpenSSL on 23rd April 2014 via HP ZDI. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team.  This flaw\nonly affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is\nenabled, which is not the default and not common. \n\nThis issue was reported in public.  The fix was developed by\nMatt Caswell of the OpenSSL development team. \n\nSSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)\n===============================================================================\n \nA race condition in the ssl3_read_bytes function can allow remote\nattackers to inject data across sessions or cause a denial of service. \nThis flaw only affects multithreaded applications using OpenSSL 1.0.0\nand 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the\ndefault and not common. \n\nThis issue was reported in public. \n\nThanks to Felix Gröbert and Ivan Fratrić at Google for discovering this\nissue.  This issue was reported to OpenSSL on 28th May 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nOther issues\n============\n\nOpenSSL 1.0.0m and OpenSSL 0.9.8za also contain a fix for\nCVE-2014-0076: Fix for the attack described in the paper \"Recovering\nOpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack\"\nReported by Yuval Yarom and Naomi Benger.  This issue was previously\nfixed in OpenSSL 1.0.1g. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20140605.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nRelease Date: 2014-06-12\nLast Updated: 2014-06-12\n\nPotential Security Impact: Remote Denial of Service (DoS), code execution,\nsecurity restriction bypass, disclosure of information, or unauthorized\naccess\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nOpenSSL. These vulnerabilities could be exploited remotely to create a Denial\nof Service (DoS), execute code, bypass security restrictions, disclose\ninformation, or allow unauthorized access. \n\nReferences:\n\nCVE-2014-0076 Remote Denial of Service (DoS)\nCVE-2014-0195 Remote Unauthorized Access\nCVE-2014-0221 Remote Denial of Service (DoS)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nCVE-2014-3470 Remote Code Execution or Unauthorized Access\nSSRT101590, SSRT101596\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before 0.9.8za\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to resolve these vulnerabilities. The\nupdates are available from the following location using ftp:\n\nftp://srt03046:Secure12@ftp.usa.hp.com\n\nUser name: srt03046\nPassword: Secure12 ( NOTE: Case sensitive)\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n A.00.09.08za.001_HP-UX_B.11.11_32+64.depot\n\nB.11.23 (11i v2)\n A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08za or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08za.001 or subsequent\n\nHP-UX B.11.23\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08za.002 or subsequent\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08za.003 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 12 June 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Summary\n\n   VMware product updates address OpenSSL security vulnerabilities. Problem Description\n\n   a. \n \n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n\n      has assigned the names CVE-2014-0224, CVE-2014-0198, \n      CVE-2010-5298, CVE-2014-3470, CVE-2014-0221 and CVE-2014-0195 to\n      these issues. The most important of these issues is \n      CVE-2014-0224. \n\n      CVE-2014-0198, CVE-2010-5298 and CVE-2014-3470 are considered to\n      be of moderate severity. Exploitation is highly unlikely or is\n      mitigated due to the application configuration. \n\n      CVE-2014-0221 and CVE-2014-0195, which are listed in the OpenSSL \n      Security Advisory (see Reference section below), do not affect\n      any VMware products. For readability\n      the affected products have been split into 3 tables below, \n      based on the different client-server configurations and\n      deployment scenarios. Applying these patches to \n      affected servers will mitigate the affected clients (See Table 1\n      below). can be mitigated by using a secure network such as \n      VPN (see Table 2 below). \n      \n      Clients and servers that are deployed on an isolated network are\n      less exposed to CVE-2014-0224 (see Table 3 below). The affected\n      products are typically deployed to communicate over the\n      management network. \n\n      RECOMMENDATIONS\n\n      VMware recommends customers evaluate and deploy patches for\n      affected Servers in Table 1 below as these patches become\n      available. Patching these servers will remove the ability to\n      exploit the vulnerability described in CVE-2014-0224 on both\n      clients and servers. VMware recommends customers consider \n      applying patches to products listed in Table 2 & 3 as required. \n\n      Column 4 of the following tables lists the action required to\n      remediate the vulnerability in each release, if a solution is\n      available. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      ESXi                            5.5       ESXi     ESXi550-\n                                                         201406401-SG \n\n      Big Data Extensions             1.1                patch pending \n      Charge Back Manager             2.6                patch pending \n\n      Horizon Workspace Server \n      GATEWAY                         1.8.1              patch pending \n      Horizon Workspace Server \n      GATEWAY                         1.5                patch pending \n\n      Horizon Workspace Server \n      DATA                            1.8.1              patch pending \n\n      Horizon Mirage Edge Gateway     4.4.2              patch pending \n      Horizon View                    5.3.1              patch pending \n\n      Horizon View Feature Pack       5.3 SP2            patch pending \n\n      NSX for Multi-Hypervisor        4.1.2              patch pending \n      NSX for Multi-Hypervisor        4.0.3              patch pending \n      NSX for vSphere                 6.0.4              patch pending \n      NVP                             3.2.2              patch pending \n      vCAC                            6.0.1              patch pending \n\n      vCloud Networking and Security  5.5.2 \t\t patch pending \n      vCloud Networking and Security  5.1.2 \t\t patch pending \n\n      vFabric Web Server              5.3.4              patch pending \n\n      vCHS - DPS-Data Protection      2.0                patch pending \n      Service\n\n      Table 2\n      ========\n      Affected clients running a vulnerable version of OpenSSL 0.9.8 \n      or 1.0.1 and communicating over an untrusted network. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      vCSA                            5.5                patch pending \n      vCSA                            5.1                patch pending \n      vCSA                            5.0                patch pending \n\n\n      ESXi                            5.1       ESXi     patch pending \n      ESXi                            5.0       ESXi     patch pending  \n\n      Workstation                     10.0.2    any      patch pending \n      Workstation                     9.0.3     any      patch pending \n      Fusion                          6.x       OSX      patch pending \n      Fusion                          5.x       OSX      patch pending \n      Player                          10.0.2    any      patch pending \n      Player                          9.0.3     any      patch pending \n\n      Chargeback Manager              2.5.x              patch pending \n\n      Horizon Workspace Client for    1.8.1    OSX       patch pending \n      Mac\n      Horizon Workspace Client for    1.5      OSX       patch pending \n      Mac\n      Horizon Workspace Client for    1.8.1    Windows   patch pending \n      Windows       \n      Horizon Workspace Client for    1.5      Windows   patch pending \n\n      OVF Tool                        3.5.1              patch pending \n      OVF Tool                        3.0.1              patch pending \n\n      vCenter Operations Manager      5.8.1              patch pending \n\n      vCenter Support Assistant       5.5.0              patch pending \n      vCenter Support Assistant       5.5.1              patch pending \n      \n      vCD                             5.1.2              patch pending    \n      vCD                             5.1.3              patch pending \n      vCD                             5.5.1.1            patch pending \n      vCenter Site Recovery Manager   5.0.3.1            patch pending \n\n      Table 3\n      =======\n      The following table lists all affected clients running a\n      vulnerable version of OpenSSL 0.9.8 or 1.0.1 and communicating\n      over an untrusted network. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      vCenter Server                  5.5       any      patch pending\n      vCenter Server                  5.1       any      patch pending\n      vCenter Server                  5.0       any      patch pending\n\n      Update Manager                  5.5       Windows  patch pending\n      Update Manager                  5.1       Windows  patch pending\n      Update Manager                  5.0       Windows  patch pending \n\n      Config Manager (VCM)            5.6                patch pending \n\n      Horizon View Client             5.3.1              patch pending \n      Horizon View Client             4.x                patch pending\n      Horizon Workspace               1.8.1              patch pending \n      Horizon Workspace               1.5                patch pending     \n \n   \n      ITBM Standard                   1.0.1              patch pending \n      ITBM Standard                   1.0                patch pending \n   \n      Studio                          2.6.0.0            patch pending \n    \n      Usage Meter                     3.3                patch pending \n      vCenter Chargeback Manager      2.6                patch pending \n      vCenter Converter Standalone    5.5                patch pending \n      vCenter Converter Standalone    5.1                patch pending \n      vCD (VCHS)                      5.6.2              patch pending \n      \n      vCenter Site Recovery Manager   5.5.1              patch pending \n      vCenter Site Recovery Manager   5.1.1              patch pending\n\n      vFabric Application Director    5.2.0              patch pending \n      vFabric Application Director    5.0.0              patch pending \n      View Client                     5.3.1              patch pending \n      View Client                     4.x                patch pending\n      VIX API                         5.5                patch pending \n      VIX API                         1.12               patch pending \n      \n      vMA (Management Assistant)      5.1.0.1            patch pending     \n  \n\n      VMware Data Recovery            2.0.3              patch pending \n     \n      VMware vSphere CLI              5.5                patch pending \n     \n      vSphere Replication             5.5.1              patch pending \n      vSphere Replication             5.6                patch pending \n      vSphere SDK for Perl            5.5                patch pending \n      vSphere Storage Appliance       5.5.1              patch pending \n      vSphere Storage Appliance       5.1.3              patch pending \n      vSphere Support Assistant       5.5.1              patch pending \n      vSphere Support Assistant       5.5.0              patch pending\n      vSphere Virtual Disk            5.5                patch pending \n      Development Kit                  \n      vSphere Virtual Disk            5.1                patch pending \n      Development Kit\n      vSphere Virtual Disk            5.0                patch pending \n      Development Kit\n \n   4. Solution\n\n   ESXi 5.5\n   ----------------------------\n\n   Download:\n   https://www.vmware.com/patchmgr/download.portal\n\n   Release Notes and Remediation Instructions:\n   http://kb.vmware.com/kb/2077359\n\n   5. Change Log\n\n   2014-06-10 VMSA-2014-0006\n   Initial security advisory in conjunction with the release of\n   ESXi 5.5 updates on 2014-06-10\n\n- -----------------------------------------------------------------------\n \n7. Contact\n\n   E-mail list for product security notifications and announcements:\n   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n   This Security Advisory is posted to the following lists:\n\n    security-announce at lists.vmware.com\n    bugtraq at securityfocus.com\n    fulldisclosure at seclists.org\n\n   E-mail: security at vmware.com\n   PGP key at: http://kb.vmware.com/kb/1055\n\n   VMware Security Advisories\n   http://www.vmware.com/security/advisories\n\n   VMware Security Response Policy\n   https://www.vmware.com/support/policies/security_response.html\n\n   VMware Lifecycle Support Phases\n   https://www.vmware.com/support/policies/lifecycle.html\n \n   Twitter\n   https://twitter.com/VMwareSRC\n\n   Copyright 2014 VMware Inc.  All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2014:0625-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0625.html\nIssue date:        2014-06-05\nCVE Names:         CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 \n                   CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. A remote attacker could possibly use this flaw to execute\narbitrary code on a DTLS client or server. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues. \nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGröbert and Ivan Fratrić of Google as the original reporters of\nCVE-2014-3470. \n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free\n1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake\n1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment\n1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-5298.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0195.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0198.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0221.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0224.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3470.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/site/articles/904433\nhttps://access.redhat.com/site/solutions/905793\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB\npJJhdOUzRUL8R2haDM4xrsk=\n=hZF8\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. ============================================================================\nUbuntu Security Notice USN-2232-3\nJune 23, 2014\n\nopenssl regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 13.10\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nUSN-2232-1 introduced a regression in OpenSSL. The upstream fix for\nCVE-2014-0224 caused a regression for certain applications that use\nrenegotiation, such as PostgreSQL. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\n Ubuntu 14.04 LTS. (CVE-2014-0195)\n  Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. \n (CVE-2014-0224)\n  Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled\n anonymous ECDH ciphersuites. This issue only\n affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. \n (CVE-2014-3470)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.4\n\nUbuntu 13.10:\n  libssl1.0.0                     1.0.1e-3ubuntu1.6\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.16\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.19\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \nCorrected:      2014-06-05 12:32:38 UTC (stable/10, 10.0-STABLE)\n                2014-06-05 12:33:23 UTC (releng/10.0, 10.0-RELEASE-p5)\n                2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1)\n                2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1-p2)\n                2014-06-05 12:33:23 UTC (releng/9.2, 9.2-RELEASE-p8)\n                2014-06-05 12:33:23 UTC (releng/9.1, 9.1-RELEASE-p15)\n                2014-06-05 12:32:38 UTC (stable/8, 8.4-STABLE)\n                2014-06-05 12:33:23 UTC (releng/8.4, 8.4-RELEASE-p12)\nCVE Name:       CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-3470]\n\nIII.  [CVE-2014-3470]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch.asc\n# gpg --verify openssl-10.patch.asc\n\n[FreeBSD 9.x and 8.x]\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch.asc\n# gpg --verify openssl-9.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r267103\nreleng/8.4/                                                       r267104\nstable/9/                                                         r267106\nreleng/9.1/                                                       r267104\nreleng/9.2/                                                       r267104\nstable/10/                                                        r267103\nreleng/10.0/                                                      r267104\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. \n\nCVE-2014-0221\n\n    Imre Rad discovered the processing of DTLS hello packets is \n    susceptible to denial of service. \n\nAdditional information can be found at \nhttp://www.openssl.org/news/secadv_20140605.txt\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1.0.1e-2+deb7u10. You can use the tool checkrestart from the package\ndebian-goodies to detect affected programs or reboot your system. There's\nalso a forthcoming security update for the Linux kernel later the day\n(CVE-2014-3153), so you need to reboot anyway. Perfect timing, isn't it?\n\nFor the unstable distribution (sid), these problems will be fixed soon. \nHP System Management Homepage versions 7.3.2 and earlier for Linux and\nWindows. HP System Management Homepage v7.2.4.1 is available for\nWindows 2003 only. \n\nHP System Management Homepage v7.2.4.1 for Windows x86:\nhttp://www.hp.com/swpublishing/MTX-d775367b0a28449ca05660778b\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98702\n\nHP System Management Homepage v7.2.4.1 for Windows x64:\nhttp://www.hp.com/swpublishing/MTX-3a7aa5e233904ebe847a5e1555\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98704\n\nHP System Management Homepage v7.3.3.1 for Windows x86:\nhttp://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98696\n\nHP System Management Homepage v7.3.3.1 for Windows x64:\nhttp://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98698\n\nHP System Management Homepage v7.3.3.1 for Linux x86:\nhttp://www.hp.com/swpublishing/MTX-511c3e0b2f6f4f6bbc796fc619\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1980463820/v98694\n\nHP System Management Homepage v7.3.3.1 for Linux x64:\nhttp://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1507410135/v98693\n\nNOTE: HP System Management Homepage v7.3.3.1 for Linux x86 still contains\nOpenSSL v1.0.0d. As long as all other products which SMH V7.3.3.1 for Linux\nx86 communicates with have been upgraded to the latest versions, it will not\nbe vulnerable to the exploits described in CVE-2014-0224. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update\n2014-004\n\nOS X Mavericks 10.9.5 and Security Update 2014-004 are now available\nand address the following:\n\napache_mod_php\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in PHP 5.4.24\nDescription:  Multiple vulnerabilities existed in PHP 5.4.24, the\nmost serious of which may have led to arbitrary code execution. This\nupdate addresses the issues by updating PHP to version 5.4.30\nCVE-ID\nCVE-2013-7345\nCVE-2014-0185\nCVE-2014-0207\nCVE-2014-0237\nCVE-2014-0238\nCVE-2014-1943\nCVE-2014-2270\nCVE-2014-3478\nCVE-2014-3479\nCVE-2014-3480\nCVE-2014-3487\nCVE-2014-3515\nCVE-2014-3981\nCVE-2014-4049\n\nBluetooth\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of a\nBluetooth API call. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4390 : Ian Beer of Google Project Zero\n\nCoreGraphics\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or an information disclosure\nDescription:  An out of bounds memory read existed in the handling of\nPDF files. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nCoreGraphics\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  An integer overflow existed in the handling of PDF\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nFoundation\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  An application using NSXMLParser may be misused to disclose\ninformation\nDescription:  An XML External Entity issue existed in NSXMLParser's\nhandling of XML. This issue was addressed by not loading external\nentities across origins. \nCVE-ID\nCVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  Compiling untrusted GLSL shaders may lead to an unexpected\napplication termination or arbitrary code execution\nDescription:  A user-space buffer overflow existed in the shader\ncompiler. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4393 : Apple\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple validation issues existed in some integrated\ngraphics driver routines. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4394 : Ian Beer of Google Project Zero\nCVE-2014-4395 : Ian Beer of Google Project Zero\nCVE-2014-4396 : Ian Beer of Google Project Zero\nCVE-2014-4397 : Ian Beer of Google Project Zero\nCVE-2014-4398 : Ian Beer of Google Project Zero\nCVE-2014-4399 : Ian Beer of Google Project Zero\nCVE-2014-4400 : Ian Beer of Google Project Zero\nCVE-2014-4401 : Ian Beer of Google Project Zero\nCVE-2014-4416 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in the handling of\nIOKit API arguments. This issue was addressed through improved\nvalidation of IOKit API arguments. \nCVE-ID\nCVE-2014-4376 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOAcceleratorFamily function. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4402 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can read kernel pointers, which can be used to\nbypass kernel address space layout randomization\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOHIDFamily function. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-4379 : Ian Beer of Google Project Zero\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IODataQueue objects. This issue was addressed\nthrough improved validation of metadata. \nCVE-ID\nCVE-2014-4388 : @PanguTeam\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4389 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can infer kernel addresses and bypass kernel\naddress space layout randomization\nDescription:  In some cases, the CPU Global Descriptor Table was\nallocated at a predictable address. This issue was addressed through\nalways allocating the Global Descriptor Table at random addresses. \nCVE-ID\nCVE-2014-4403 : Ian Beer of Google Project Zero\n\nLibnotify\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with root privileges\nDescription:  An out-of-bounds write issue existed in Libnotify. This\nissue was addressed through improved bounds checking\nCVE-ID\nCVE-2014-4381 : Ian Beer of Google Project Zero\n\nOpenSSL\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in OpenSSL 0.9.8y, including one\nthat may lead to arbitrary code execution\nDescription:  Multiple vulnerabilities existed in OpenSSL 0.9.8y. \nCVE-ID\nCVE-2014-0076\nCVE-2014-0195\nCVE-2014-0221\nCVE-2014-0224\nCVE-2014-3470\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nRLE encoded movie files. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom\nGallagher & Paul Bates working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted MIDI file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the handling of MIDI\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nthe 'mvhd' atoms. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day\nInitiative\n\nruby\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A remote attacker may be able to cause arbitrary code\nexecution\nDescription:  A heap buffer overflow existed in LibYAML's handling of\npercent-encoded characters in a URI. This issue was addressed through\nimproved bounds checking. This update addresses the issues by\nupdating LibYAML to version 0.1.6\nCVE-ID\nCVE-2014-2525\n\n\nNote: OS X Mavericks 10.9.5 includes the security content of\nSafari 7.0.6: http://support.apple.com/kb/HT6367\n\nOS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nk4w2RKNm0Fv+kdNoFAnd\n=gpVc\n-----END PGP SIGNATURE-----\n\n. \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k\n does not enforce certain constraints on certificate data, which allows\n remote attackers to defeat a fingerprint-based certificate-blacklist\n protection mechanism by including crafted data within a\n certificate&#039;s unsigned portion, related to crypto/asn1/a_verify.c,\n crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c\n (CVE-2014-8275). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n \n The updated packages have been upgraded to the 1.0.1m version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "BID",
            id: "67898",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "126961",
         },
         {
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
      ],
      trust: 3.33,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3470",
            trust: 3.7,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "67898",
            trust: 1.4,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59916",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58742",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59659",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59310",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59191",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59483",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59189",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59431",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59282",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59362",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59491",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59364",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59449",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59192",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59990",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59167",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58945",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59126",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58716",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61254",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59175",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59442",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59459",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59445",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59451",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59264",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59306",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58579",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59518",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59440",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59120",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59784",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58615",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59460",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59284",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59495",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58714",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59365",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59438",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59223",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59441",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59525",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58797",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59340",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59895",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58667",
            trust: 1.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-234763",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03",
            trust: 1.1,
         },
         {
            db: "JVN",
            id: "JVNVU93868849",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03G",
            trust: 0.4,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03F",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03B",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03C",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03D",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3470",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128315",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127159",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127136",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127362",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126937",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126957",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127166",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127630",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126927",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127045",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127086",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126961",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128001",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127042",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "BID",
            id: "67898",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            db: "PACKETSTORM",
            id: "126961",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   id: "VAR-201406-0117",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4195407518181817,
   },
   last_update_date: "2024-11-29T19:53:19.104000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "HT6443",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT6443",
         },
         {
            title: "HT6443",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT6443?viewlocale=ja_JP",
         },
         {
            title: "KB36051",
            trust: 0.8,
            url: "http://www.blackberry.com/btsc/KB36051",
         },
         {
            title: "cisco-sa-20140605-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl",
         },
         {
            title: "トップページ",
            trust: 0.8,
            url: "http://fedoraproject.org/ja/",
         },
         {
            title: "HIRT-PUB14010",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/hirt/publications/hirt-pub14010/index.html",
         },
         {
            title: "6060",
            trust: 0.8,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E",
         },
         {
            title: "6061",
            trust: 0.8,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E",
         },
         {
            title: "1676062",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            title: "4037761",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761",
         },
         {
            title: "1676419",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            title: "1676128",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            title: "1676496",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496",
         },
         {
            title: "1676655",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            title: "00001841",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            title: "1677695",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            title: "00001843",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            title: "1677828",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            title: "1673137",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            title: "1678167",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            title: "1676035",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            title: "1678289",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            title: "2079783",
            trust: 0.8,
            url: "http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2079783",
         },
         {
            title: "7015264",
            trust: 0.8,
            url: "http://www.novell.com/support/kb/doc.php?id=7015264",
         },
         {
            title: "7015300",
            trust: 0.8,
            url: "http://www.novell.com/support/kb/doc.php?id=7015300",
         },
         {
            title: "SB10075",
            trust: 0.8,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075",
         },
         {
            title: "Fix CVE-2014-3470",
            trust: 0.8,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb",
         },
         {
            title: "Anonymous ECDH denial of service (CVE-2014-3470)",
            trust: 0.8,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2014",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2014 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014verbose-1972958.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html",
         },
         {
            title: "Bug 1103600",
            trust: 0.8,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600",
         },
         {
            title: "SA80",
            trust: 0.8,
            url: "https://kb.bluecoat.com/index?page=content&id=SA80",
         },
         {
            title: "Huawei-SA-20140613-OpenSSL",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            title: "January 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update",
         },
         {
            title: "CVE-2014-3470 Denial of Service(DOS) vulnerability in OpenSSL",
            trust: 0.8,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3470_denial_of",
         },
         {
            title: "Splunk Enterprise 6.1.2, 6.0.5 and 5.0.9 address two vulnerabilities - July 1, 2014",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAM2D",
         },
         {
            title: "TLSA-2014-6",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2014/TLSA-2014-6j.html",
         },
         {
            title: "VMSA-2014-0006",
            trust: 0.8,
            url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html",
         },
         {
            title: "34549",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/viewAlert.x?alertId=34549",
         },
         {
            title: "OpenSSLの脆弱性(CVE-2014-0224他)によるテープライブラリ装置への影響について",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssl_cve20140224_tape_library.html",
         },
         {
            title: "cisco-sa-20140605-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1122/1122700_cisco-sa-20140605-openssl-j.html",
         },
         {
            title: "Symfoware Server: OpenSSLの脆弱性(CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470)(2014年7月15日)",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/products-fujitsu/solution/symfoware_201404.html",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/07/10/fireeye_patches_os_torpedo_exploitdb_disclosure/",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=b92b65104373bc8476811ff1b99cd369",
         },
         {
            title: "Red Hat: CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3470",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-3",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-4",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-2",
         },
         {
            title: "Debian Security Advisories: DSA-2950-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=909292f2afe623fbec51f7ab6b32f790",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2014-3470 ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/PotterXma/linux-deployment-standard ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-476",
            trust: 1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 1.4,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.4,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071",
         },
         {
            trust: 1.4,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626",
         },
         {
            trust: 1.4,
            url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6",
         },
         {
            trust: 1.4,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html",
         },
         {
            trust: 1.4,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 1.2,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/67898",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58797",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59191",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58579",
         },
         {
            trust: 1.1,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59438",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59491",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59659",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59120",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59126",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59442",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015300",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1.1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6060&myns=phmc&mync=e",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59495",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015264",
         },
         {
            trust: 1.1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6061&myns=phmc&mync=e",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.1,
            url: "http://www.splunk.com/view/sp-caaam2d",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59895",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59459",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59451",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59916",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59990",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59784",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/kb/ht6443",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1.1,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59365",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59364",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59362",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59340",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59310",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59306",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59284",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59282",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59264",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59223",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59192",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59189",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59175",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59167",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58945",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58742",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58716",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58714",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58667",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58615",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29195",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:106",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:105",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61254",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59525",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59518",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59483",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59460",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59449",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59445",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59441",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59440",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59431",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=8011cd56e39a433b1837465259a9bd24a38727fb",
         },
         {
            trust: 1.1,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03",
         },
         {
            trust: 1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu93868849/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3470",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.5,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03g",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3470_denial_of",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list&showdraft=false",
         },
         {
            trust: 0.3,
            url: "http://www.cerberusftp.com/products/releasenotes.html",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2014/06/chrome-for-android-update.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678123",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678073",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www8.hp.com/us/en/software-solutions/operations-analytics-operations-analysis/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685551",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096059",
         },
         {
            trust: 0.3,
            url: "http://www.marshut.com/ixwnpv/stunnel-5-02-released.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100180978",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03d",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04363613",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368523",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "https://www-01.ibm.com/support/docview.wss?uid=swg21681494",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678413",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676673",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678660",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/33a01-5228bdf5d027e/cert_security_mini-_bulletin_xrx15ao_for_cq8570-cq8870_v1-0.pdf",
         },
         {
            trust: 0.3,
            url: "http://www.checkpoint.com/defense/advisories/public/2014/cpai-10-jun3.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181079",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676276",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676840",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682023",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682026",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682024",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690128",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03b",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03c",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03f",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www.ubuntu.com/usn/usn-2232-4/",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list",
         },
         {
            trust: 0.2,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/solutions/905793",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0224.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0198.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2010-5298.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3470.html",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0195.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/476.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=34549",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2232-3/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4378",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4379",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0238",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1943",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4376",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-7345",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4377",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4350",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4381",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2525",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0237",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3480",
         },
         {
            trust: 0.1,
            url: "http://www.vsecurity.com/)",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2270",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0207",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3515",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht6367",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3479",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3478",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4049",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4374",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3981",
         },
         {
            trust: 0.1,
            url: "http://h71000.www7.hp.com/openvms/products/ssl/ssl.html",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayp",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-511c3e0b2f6f4f6bbc796fc619",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-bd9a1cf60e344c549c4888db93",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-3395d737d98f42149125b9bb05",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-3a7aa5e233904ebe847a5e1555",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-d775367b0a28449ca05660778b",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-e8076c2a35804685ad65b2b1ba",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-10.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-9.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-10.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://www.openssl.org/news/secadv_20140605.txt>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:14.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-9.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-3",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1332643",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "https://twitter.com/vmwaresrc",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/security/advisories",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1055",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2077359",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/lifecycle.html",
         },
         {
            trust: 0.1,
            url: "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/security_response.html",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/patchmgr/download.portal",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0679.html",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "BID",
            id: "67898",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            db: "PACKETSTORM",
            id: "126961",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            db: "BID",
            id: "67898",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            db: "PACKETSTORM",
            id: "126961",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-06-05T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "BID",
            id: "67898",
         },
         {
            date: "2014-06-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            date: "2014-09-19T15:26:13",
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            date: "2014-06-19T23:12:50",
            db: "PACKETSTORM",
            id: "127159",
         },
         {
            date: "2014-06-17T23:11:00",
            db: "PACKETSTORM",
            id: "127136",
         },
         {
            date: "2014-07-06T18:53:39",
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            date: "2014-06-05T19:57:42",
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            date: "2014-06-05T21:06:55",
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2014-06-24T00:52:51",
            db: "PACKETSTORM",
            id: "127166",
         },
         {
            date: "2014-07-28T20:36:25",
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            date: "2014-06-05T15:17:27",
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            date: "2014-06-11T23:18:46",
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            date: "2014-06-13T13:31:32",
            db: "PACKETSTORM",
            id: "127086",
         },
         {
            date: "2014-06-05T21:13:52",
            db: "PACKETSTORM",
            id: "126961",
         },
         {
            date: "2014-08-26T11:11:00",
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            date: "2014-06-11T00:10:53",
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            date: "2014-06-05T21:55:07.880000",
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3470",
         },
         {
            date: "2018-10-11T12:00:00",
            db: "BID",
            id: "67898",
         },
         {
            date: "2015-12-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
         {
            date: "2024-11-21T02:08:10.227000",
            db: "NVD",
            id: "CVE-2014-3470",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "67898",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  s3_clnt.c of  ssl3_send_client_key_exchange Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002767",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "67898",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0295
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling B2B Integrator is a set of software that integrates B2B processes, transactions and relationships of different partner communities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0295",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60994",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60994",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0567",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0567",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-60569",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0567",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0567",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-057",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60569",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, and CVE-2013-0475. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling B2B Integrator is a set of software that integrates B2B processes, transactions and relationships of different partner communities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "BID",
            id: "60994",
         },
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0567",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "83164",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC91151",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60994",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60569",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            db: "BID",
            id: "60994",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   id: "VAR-201307-0295",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:39:04.712000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC91151",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC91151",
         },
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic91151",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/83164",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0567",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0567",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/83164",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            db: "BID",
            id: "60994",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            db: "BID",
            id: "60994",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60994",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            date: "2013-07-03T13:54:31.057000",
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60569",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60994",
         },
         {
            date: "2013-10-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
         {
            date: "2017-08-29T01:33:06.620000",
            db: "NVD",
            id: "CVE-2013-0567",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003203",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-057",
         },
      ],
      trust: 0.6,
   },
}

var-201503-0052
Vulnerability from variot

Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import. OpenSSL is prone to remote memory-corruption vulnerability. Note: This issue was previously discussed in BID 73196 (OpenSSL Multiple Unspecified Security Vulnerabilities) but has been given its own record to better document it. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will result in denial-of-service conditions. The Common Vulnerabilities and Exposures project identifies the following issues:

CVE-2015-0286

Stephen Henson discovered that the ASN1_TYPE_cmp() function
can be crashed, resulting in denial of service.

CVE-2015-0287

Emilia Kaesper discovered a memory corruption in ASN.1 parsing.

CVE-2015-0292

It was discovered that missing input sanitising in base64 decoding
might result in memory corruption.

CVE-2015-0209

It was discovered that a malformed EC private key might result in
memory corruption.

CVE-2015-0288

It was discovered that missing input sanitising in the
X509_to_X509_REQ() function might result in denial of service. In this update the export ciphers are removed

from the default cipher list. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04626468

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04626468 Version: 1

HPSBGN03306 rev.1 - HP IceWall SSO MCRP, SSO Dfw, and SSO Agent running OpenSSL, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2015-04-06 Last Updated: 2015-04-06

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP IceWall SSO MCRP, SSO Dfw, and SSO Agent running OpenSSL. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS).

References:

CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 SSRT102007

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP IceWall MCRP version 2.1, 2.1 SP1, 2.1 SP2, and 3.0 HP IceWall SSO Dfw version 8.0, 8.0 R1, 8.0 R2, 8.0 R3, and 10.0 HP IceWall SSO Agent version 8.0 and 8.0 2007 Update Release 2

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-0209 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-0286 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0287 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0288 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0289 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP recommends the following software updates or workarounds to resolve the vulnerabilities for HP IceWall SSO MCRP, SSO Dfw, and SSO Agent.

Workaround for HP IceWall SSO MCRP:

- If possible, do not use the CLIENT_CERT and CLIENT_CERTKEY settings in

the host configuration file. Not setting these will prevent MCRP from using those client certificates for communicating with the back-end web servers.

- If the CLIENT_CERT and CLIENT_CERTKEY settings must be used, then there

is no workaround other than applying a vendor patch for OpenSSL for these vulnerabilities.

Workaround for HP IceWall SSO Dfw and SSO Agent:

- If possible, do not use client certificates for SSL communication

between the client and server which are running HP IceWall SSO Dfw or SSO Agent.

- If client certificates for SSL communication between the client and

server must be used, then there is no workaround other than applying a vendor patch for OpenSSL for these vulnerabilities. IceWall SSO Dfw 10.0 running on RHEL could be using either the OS bundled OpenSSL library or the OpenSSL bundled with HP IceWall. If still using the OpenSSL bundled with HP IceWall, please switch to the OpenSSL library bundled with the OS, and then follow the instructions in step 3.

  Documents are available at the following location with instructions to

switch to the OS bundled OpenSSL library:

  http://www.hp.com/jp/icewall_patchaccess

2. For IceWall SSO Dfw 8.0, 8.0 R1, 8.0 R2, 8.0 R3 which bundle OpenSSL,

please download the updated OpenSSL at the following location:

  http://www.hp.com/jp/icewall_patchaccess

3. For IceWall products running on HP-UX which are using the OS bundled

OpenSSL, please apply the HP-UX OpenSSL update for openssl-0.9.8zf when it is available from the following location:

  https://h20392.www2.hp.com/portal/swdepot/displayInstallInfo.do?product

Number=OPENSSL11I

Note: The HP IceWall product is only available in Japan.

HISTORY Version:1 (rev.1) - 6 April 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue became relevant after the CVE-2014-3568 fix (CVE-2014-3569).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c (CVE-2014-8275).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).

The updated packages have been upgraded to the 1.0.1m version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS kz0ex6eI6hA6qSwklA2NoXY= =GYjX -----END PGP SIGNATURE----- .

Release Date: 2015-08-24 Last Updated: 2015-08-24

Potential Security Impact: Remote unauthorized modification, unauthorized access, or unauthorized disclosure of information. Please order the latest version of the HP Matrix Operating Environment 7.5.0 DVD #2 ISO from the following location:

http://www.hp.com/go/insightupdates

Choose the orange Select button. This presents the HP Insight Management Media order page. Choose Insight Management 7.5 DVD-2-ZIP August 2015 from the Software specification list. Fill out the rest of the form and submit it.

HP has addressed these vulnerabilities for the affected software components bundled with the HP Matrix Operating Environment in the following HP Security Bulletins. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-15:06.openssl Security Advisory The FreeBSD Project

Topic: Multiple OpenSSL vulnerabilities

Category: contrib Module: openssl Announced: 2015-03-19 Affects: All supported versions of FreeBSD. Corrected: 2015-03-19 17:40:43 UTC (stable/10, 10.1-STABLE) 2015-03-19 17:42:38 UTC (releng/10.1, 10.1-RELEASE-p7) 2015-03-19 17:40:43 UTC (stable/9, 9.3-STABLE) 2015-03-19 17:42:38 UTC (releng/9.3, 9.3-RELEASE-p11) 2015-03-19 17:40:43 UTC (stable/8, 8.4-STABLE) 2015-03-19 17:42:38 UTC (releng/8.4, 8.4-RELEASE-p25) CVE Name: CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0293

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

Abstract Syntax Notation One (ASN.1) is a standard and notation that describes rules and structures for representing, encoding, transmitting, and decoding data in telecommunications and computer networking, which enables representation of objects that are independent of machine-specific encoding technique.

II. Problem Description

A malformed elliptic curve private key file could cause a use-after-free condition in the d2i_ECPrivateKey function. [CVE-2015-0209]

An attempt to compare ASN.1 boolean types will cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286]

Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. [CVE-2015-0287]

The function X509_to_X509_REQ will crash with a NULL pointer dereference if the certificate key is invalid. [CVE-2015-0288]

The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. [CVE-2015-0289]

A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293]

III. [CVE-2015-0209]

A remote attacker who is able to send specifically crafted certificates may be able to crash an OpenSSL client or server. [CVE-2015-0286]

An attacker who can cause invalid writes with applications that parse structures containing CHOICE or ANY DEFINED BY components and reusing the structures may be able to cause them to crash. Such reuse is believed to be rare. OpenSSL clients and servers are not affected. [CVE-2015-0287]

An attacker may be able to crash applications that create a new certificate request with subject name the same as in an existing, specifically crafted certificate. This usage is rare in practice. [CVE-2015-0288]

An attacker may be able to crash applications that verify PKCS#7 signatures, decrypt PKCS#7 data or otherwise parse PKCS#7 structures with specifically crafted certificates. [CVE-2015-0289]

A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a carefully crafted SSLv2 CLIENT-MASTER-KEY message, resulting in a Denial of Service. [CVE-2015-0293]

Note that two issues in the original OpenSSL advisory, CVE-2015-0204 and CVE-2015-0292, were already addressed by FreeBSD-SA-15:01.openssl and FreeBSD-EN-15:02.openssl.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 8.4 and FreeBSD 9.3]

fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-0.9.8.patch

fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-0.9.8.patch.asc

gpg --verify openssl-0.9.8.patch.asc

[FreeBSD 10.1]

fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-1.0.1.patch

fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-1.0.1.patch.asc

gpg --verify openssl-1.0.1.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r280266 releng/8.4/ r280268 stable/9/ r280266 releng/9.3/ r280268 stable/10/ r280266 releng/10.1/ r280268


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.2 (FreeBSD)

iQIcBAEBCgAGBQJVCwr1AAoJEO1n7NZdz2rnayEP/0w3Pba5k/1G0mJ1T9APNAns hhXm0YuR/rNJ1XBooWEOctrijlsVChcIt8KvJCU9apOZWjDvm/nvaQ077GCi5RSp jhQBs8MLVfXzwMbJ0/uBpp6ChF8uafk5O+gr8ulb2jG6VIaLkGOWPYv61aRYSGxy R7+6FxD8M0lLbGOQGETy1HxKzeWztA2p0ILORNAsi+bF8GSJpxGhSxqDDi4+ic/C 3oEw0zT/E6DhxJovOPebKq0eGcRbv7ETqDmtNQdqbOddV+0FY1E+nHtrAo6B/Kln rL+meBJHmLeEREROFk4OvCynuROUJGmXJGKwjN3uOVM05qcEZS4NkVhFNrxt6S5H t3wQ02SesbA3pbmce5OuXmlJgdL57DVlMb5sQjkqPeoJ6pn6Rz7VLSgLNfXDUSxs x/Lgx0+qLQUubMud7zT97UIvZmDqFTWXfJu5S/0Qt8BPFunmoNJttJ5Cr+brzEtu 5RLjcvkC1giVCpSXS96QbeT67uqSkMZa8gtII8bA77HBGA0Ky8AOwTAXbCiUovuH sLwsI8KUC3lsKUh7eyLsSm2+wRHn0e6dZ1PE0JRazCnCRboTvMWK2d4R7ANdrwsq CgtCWLRz6vbB9J4XTNupcEoZGhIA4RuOBqx43eQmaRw1HoV3vn85QP94oL5jzXBd UQg3YfrXHDlxCsqEzN7o =wi0T -----END PGP SIGNATURE----- . Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Storage 2.1.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:

Red Hat Storage Server 2.1 - x86_64

  1. (CVE-2015-0286)

An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292)

A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. (CVE-2015-0209)

An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. (CVE-2015-0289)

Red Hat would like to thank the OpenSSL project for reporting CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, and CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL development team as the original reporter of CVE-2015-0286, Emilia Käsper of the OpenSSL development team as the original reporter of CVE-2015-0287, Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski of Google as the original reporter of CVE-2015-0289, Robert Dugal and David Ramos as the original reporters of CVE-2015-0292, and Sean Burford of Google and Emilia Käsper of the OpenSSL development team as the original reporters of CVE-2015-0293.

All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import 1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp() 1202380 - CVE-2015-0287 openssl: ASN.1 structure reuse memory corruption 1202384 - CVE-2015-0289 openssl: PKCS7 NULL pointer dereference 1202395 - CVE-2015-0292 openssl: integer underflow leading to buffer overflow in base64 decoding 1202404 - CVE-2015-0293 openssl: assertion failure in SSLv2 servers 1202418 - CVE-2015-0288 openssl: X509_to_X509_REQ NULL pointer dereference

  1. Package List:

Red Hat Storage Server 2.1:

Source: openssl-1.0.1e-30.el6_6.7.src.rpm

x86_64: openssl-1.0.1e-30.el6_6.7.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.7.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.7.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.7.x86_64.rpm openssl-static-1.0.1e-30.el6_6.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2015-0209 https://access.redhat.com/security/cve/CVE-2015-0286 https://access.redhat.com/security/cve/CVE-2015-0287 https://access.redhat.com/security/cve/CVE-2015-0288 https://access.redhat.com/security/cve/CVE-2015-0289 https://access.redhat.com/security/cve/CVE-2015-0292 https://access.redhat.com/security/cve/CVE-2015-0293 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150319.txt https://access.redhat.com/articles/1384453

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc. Description:

This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)

  • This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)

  • This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)

  • This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)

  • This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)

  • A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)

  • A memory leak flaw was fixed in expat.

See the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory. Solution:

The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). JIRA issues fixed (https://issues.jboss.org/):

JBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0] JBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service

6

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0052",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8ze",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.6,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.6,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "0.9.8ze",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "hp-ux b.11.23 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v2)",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.32",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "bladecenter advanced management module 25r5778",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.186",
         },
         {
            model: "algo one ase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1948",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "icewall mcrp sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "pureapplication system interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.0.1",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "i operating system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "big-ip apm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip pem hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.41",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "big-ip webaccelerator hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "big-ip gtm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.780",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.5",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "cms",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "17.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "project openssl 1.0.2a",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "vios fp-25 sp-02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.4",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.6.1.0.0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip analytics hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.842",
         },
         {
            model: "big-ip edge gateway 11.1.0-hf2",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip asm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.0",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0.870",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2-77",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip aam hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip edge gateway hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.1.0",
         },
         {
            model: "project openssl 1.0.1m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "linerate",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.4.2",
         },
         {
            model: "big-iq adc hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.840",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "systems insight manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "5.0",
         },
         {
            model: "project openssl 1.0.0r",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system storage san48b-5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "big-ip psm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "big-ip aam",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "2.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "qlogic 8gb intelligent pass-thru module & san switch module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.10.1.31.00",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.96",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8720",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.23",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "big-ip webaccelerator hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6.156",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "infosphere guardium database activity monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.1",
         },
         {
            model: "big-ip asm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.12",
         },
         {
            model: "flex system en4023 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.1c",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8886",
         },
         {
            model: "cognos controller if4",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "algo one pcre",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "aspera ondemand",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5",
         },
         {
            model: "big-ip analytics hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.3",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip edge gateway hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.0.820",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.5.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.1",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "big-ip link controller hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip edge gateway 10.2.3-hf1",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.4",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "infinity",
            scope: "ne",
            trust: 0.3,
            vendor: "pexip",
            version: "9.0",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "tssc/imc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "totalstorage san256b director model m48",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7967",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.102",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.4",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.1.830",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8852",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8750",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15-210",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip analytics hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.2",
         },
         {
            model: "big-ip ltm hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "tivoli netcool system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "big-ip pem hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12.201",
         },
         {
            model: "big-ip ltm hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.95",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "1.0",
         },
         {
            model: "cognos controller fp3 if2",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.11",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.8.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7.770",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "algo one aggregation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.0.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "hp-ux b.11.11 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v1)",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "big-ip edge gateway 11.0.0-hf2",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "system storage san384b",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "system storage san80b-4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.96",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "big-ip edge gateway hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "big-ip apm hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "algo one ase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2.127",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.800",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.10",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-109",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip asm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1881",
         },
         {
            model: "aspera orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "big-ip psm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "big-ip gtm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-iq device hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.9",
         },
         {
            model: "algo one mag",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.11",
         },
         {
            model: "big-ip apm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.2",
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1-73",
         },
         {
            model: "big-ip psm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.780",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "big-ip asm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "cognos insight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2.4",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "big-ip psm hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.4",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "integration bus",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.21",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0-14",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "big-ip link controller hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "sametime community server hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "big-ip edge gateway hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.04",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "big-ip webaccelerator hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0.860",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "system management homepage b",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5.146",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7779",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5",
         },
         {
            model: "sametime community server limited use",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.02",
         },
         {
            model: "system storage san04b-r",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "hp-ux b.11.31 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v3)",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0.870",
         },
         {
            model: "big-ip link controller hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip link controller hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.20",
         },
         {
            model: "big-ip edge gateway hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip analytics hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.12.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "ctpos 7.0r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip analytics hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.840",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.14",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15210",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "big-ip psm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "big-ip webaccelerator hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip gtm hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "alienvault",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "flex system en4023 10gb scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "big-ip gtm hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "big-ip analytics 11.0.0-hf2",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3.740",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "big-ip afm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "big-ip aam",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "4.0",
         },
         {
            model: "system management homepage 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.3.0",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "system storage san42b-r",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "big-ip analytics hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9.2",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.3",
         },
         {
            model: "big-ip ltm hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "big-ip edge gateway hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip apm hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "algo one pcre",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "ringmaster appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "big-iq security hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-108",
         },
         {
            model: "big-ip psm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "cognos controller fp1 if1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.1",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vgw",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.0.820",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "big-ip apm hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "6.0",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2.835",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.41",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "big-ip link controller hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1.0",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.33",
         },
         {
            model: "src series",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "openssh for gpfs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.3.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "3.0",
         },
         {
            model: "big-ip edge gateway 11.1.0-hf3",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2.106",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "big-ip pem hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "systems insight manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.1.0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.03",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.1.830",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "big-ip link controller hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "big-ip link controller hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.5.1.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.14.20",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "big-ip apm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5.760",
         },
         {
            model: "aspera drive",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.1",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "system storage san768b",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip gtm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.50",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15.1",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "system networking san24b-5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.0.0",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.14",
         },
         {
            model: "i operating systems",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.9.0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "tivoli netcool system service monitor fp14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "algo one mag",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.8",
         },
         {
            model: "websphere message broker",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tssc/imc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9.790",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "big-ip aam",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "big-ip asm hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1.730",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "linerate",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.4",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-iq adc",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "screenos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "bladecenter t advanced management module 32r0835",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.801",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "big-ip gtm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "big-ip webaccelerator hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "system storage san768b-2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system storage san06b-r",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "pureapplication system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.80",
         },
         {
            model: "big-ip link controller hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "systems insight manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "encryption switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "big-ip aam hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip link controller 11.1.0-hf3",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.0.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "big-ip link controller hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.3",
         },
         {
            model: "big-ip asm hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4.143",
         },
         {
            model: "cognos controller fp1 if1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.1.0",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-ip aam",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.4",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8730",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1.0",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3.132",
         },
         {
            model: "big-ip psm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "big-ip edge gateway 11.0.0-hf1",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7989",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1.104",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "nsm",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8740",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0.860",
         },
         {
            model: "icewall mcrp sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "big-ip apm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "qlogic 8gb intelligent pass-thru module & san switch module",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.10.1.35.00",
         },
         {
            model: "infosphere guardium database activity monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3",
         },
         {
            model: "big-ip psm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "pulse secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "system storage san24b-4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.7",
         },
         {
            model: "big-ip asm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip apm hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5.146",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "systems insight manager sp6",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1.73",
         },
         {
            model: "big-ip gtm hf5",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "big-ip link controller 11.1.0-hf2",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "big-ip webaccelerator hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "icewall sso agent option update rele",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "system storage san40b-4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "system networking san96b-5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "big-ip webaccelerator hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.34",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1841",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.4",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.1",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "big-ip analytics hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.179",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.40",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "junos os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "big-ip asm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1886",
         },
         {
            model: "big-ip analytics hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip ltm hf9",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.2.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "system storage san384b-2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "big-ip asm hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.0",
         },
         {
            model: "big-ip psm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "big-ip asm hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip gtm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.01",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "big-ip wom hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8677",
         },
         {
            model: "ctpos 6.6r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "big-ip analytics hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2.835",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.841",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.13",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.103",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "big-ip wom hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip gtm hf15",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "big-ip link controller hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "big-ip analytics hf2",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "big-ip gtm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.0.121",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "big-ip aam",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "big-ip psm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1.1",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7.770",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.0d5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip pem hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.1",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "big-ip edge gateway hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "systems insight manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4.750",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "big-ip edge gateway hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "i operating system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "7.0",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.8",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.800",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ctpos 6.6r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip psm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos controller fp1 if2",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9.790",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "73239",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "BoringSSL project",
      sources: [
         {
            db: "BID",
            id: "73239",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-0209",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2015-0209",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-0209",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201503-396",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-0209",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import. OpenSSL is prone to remote memory-corruption vulnerability. \nNote: This issue was previously discussed in BID 73196 (OpenSSL Multiple Unspecified Security Vulnerabilities) but has been given its own record to better document it. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application  using the vulnerable library. Failed exploit attempts will result in denial-of-service conditions. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-0286\n\n    Stephen Henson discovered that the ASN1_TYPE_cmp() function\n    can be crashed, resulting in denial of service. \n\nCVE-2015-0287\n\n    Emilia Kaesper discovered a memory corruption in ASN.1 parsing. \n\nCVE-2015-0292\n\n    It was discovered that missing input sanitising in base64 decoding\n    might result in memory corruption. \n\nCVE-2015-0209\n\n    It was discovered that a malformed EC private key might result in\n    memory corruption. \n\nCVE-2015-0288\n\n    It was discovered that missing input sanitising in the\n    X509_to_X509_REQ() function might result in denial of service. In this update the export ciphers are removed\nfrom the default cipher list. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04626468\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04626468\nVersion: 1\n\nHPSBGN03306 rev.1 - HP IceWall SSO MCRP, SSO Dfw, and SSO Agent running\nOpenSSL, Remote Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-04-06\nLast Updated: 2015-04-06\n\nPotential Security Impact: Remote Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\n  Potential security vulnerabilities have been identified with HP IceWall SSO\nMCRP, SSO Dfw, and SSO Agent running OpenSSL. The vulnerabilities could be\nexploited remotely resulting in Denial of Service (DoS). \n\nReferences:\n\n  CVE-2015-0209\n  CVE-2015-0286\n  CVE-2015-0287\n  CVE-2015-0288\n  CVE-2015-0289\n  SSRT102007\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n  HP IceWall MCRP version 2.1, 2.1 SP1, 2.1 SP2, and 3.0\n  HP IceWall SSO Dfw version 8.0, 8.0 R1, 8.0 R2, 8.0 R3, and 10.0\n  HP IceWall SSO Agent version 8.0 and 8.0 2007 Update Release 2\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-0209    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2015-0286    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0287    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0288    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0289    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP recommends the following software updates or workarounds to resolve the\nvulnerabilities for HP IceWall SSO MCRP, SSO Dfw, and SSO Agent. \n\n  Workaround for HP IceWall SSO MCRP:\n\n    - If possible, do not use the CLIENT_CERT and CLIENT_CERTKEY settings in\nthe host configuration file. Not setting these will prevent MCRP from using\nthose client certificates for communicating with the back-end web servers. \n\n    - If the CLIENT_CERT and CLIENT_CERTKEY settings must be used, then there\nis no workaround other than applying a vendor patch for OpenSSL for these\nvulnerabilities. \n\n  Workaround for HP IceWall SSO Dfw and SSO Agent:\n\n    - If possible, do not use client certificates for SSL communication\nbetween the client and server which are running HP IceWall SSO Dfw or SSO\nAgent. \n\n    - If client certificates for SSL communication between the client and\nserver must be used, then there is no workaround other than applying a vendor\npatch for OpenSSL for these vulnerabilities. IceWall SSO Dfw 10.0 running on RHEL could be using either the OS\nbundled OpenSSL library or the OpenSSL bundled with HP IceWall. If still\nusing the OpenSSL bundled with HP IceWall, please switch to the OpenSSL\nlibrary bundled with the OS, and then follow the instructions in step 3. \n\n      Documents are available at the following location with instructions to\nswitch to the OS bundled OpenSSL library:\n\n      http://www.hp.com/jp/icewall_patchaccess\n\n    2. For IceWall SSO Dfw 8.0, 8.0 R1, 8.0 R2, 8.0 R3 which bundle OpenSSL,\nplease download the updated OpenSSL at the following location:\n\n      http://www.hp.com/jp/icewall_patchaccess\n\n    3. For IceWall products running on HP-UX which are using the OS bundled\nOpenSSL, please apply the HP-UX OpenSSL update for openssl-0.9.8zf when it is\navailable from the following location:\n\n      https://h20392.www2.hp.com/portal/swdepot/displayInstallInfo.do?product\nNumber=OPENSSL11I\n\nNote: The HP IceWall product is only available in Japan. \n\nHISTORY\nVersion:1 (rev.1) - 6 April 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue\n became relevant after the CVE-2014-3568 fix (CVE-2014-3569). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k\n does not enforce certain constraints on certificate data, which allows\n remote attackers to defeat a fingerprint-based certificate-blacklist\n protection mechanism by including crafted data within a\n certificate&#039;s unsigned portion, related to crypto/asn1/a_verify.c,\n crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c\n (CVE-2014-8275). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n \n The updated packages have been upgraded to the 1.0.1m version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS\nkz0ex6eI6hA6qSwklA2NoXY=\n=GYjX\n-----END PGP SIGNATURE-----\n. \n\nRelease Date: 2015-08-24\nLast Updated: 2015-08-24\n\nPotential Security Impact: Remote unauthorized modification, unauthorized\naccess, or unauthorized disclosure of information. Please order\nthe latest version of the HP Matrix Operating Environment 7.5.0 DVD #2 ISO\nfrom the following location:\n\nhttp://www.hp.com/go/insightupdates\n\nChoose the orange Select button. This presents the HP Insight Management\nMedia order page. Choose Insight Management 7.5 DVD-2-ZIP August 2015 from\nthe Software specification list. Fill out the rest of the form and submit it. \n\nHP has addressed these vulnerabilities for the affected software components\nbundled with the HP Matrix Operating Environment in the following HP Security\nBulletins. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-15:06.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          Multiple OpenSSL vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2015-03-19\nAffects:        All supported versions of FreeBSD. \nCorrected:      2015-03-19 17:40:43 UTC (stable/10, 10.1-STABLE)\n                2015-03-19 17:42:38 UTC (releng/10.1, 10.1-RELEASE-p7)\n                2015-03-19 17:40:43 UTC (stable/9, 9.3-STABLE)\n                2015-03-19 17:42:38 UTC (releng/9.3, 9.3-RELEASE-p11)\n                2015-03-19 17:40:43 UTC (stable/8, 8.4-STABLE)\n                2015-03-19 17:42:38 UTC (releng/8.4, 8.4-RELEASE-p25)\nCVE Name:       CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288,\n                CVE-2015-0289, CVE-2015-0293\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:https://security.FreeBSD.org/>. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nAbstract Syntax Notation One (ASN.1) is a standard and notation that\ndescribes rules and structures for representing, encoding, transmitting,\nand decoding data in telecommunications and computer networking, which\nenables representation of objects that are independent of machine-specific\nencoding technique. \n\nII.  Problem Description\n\nA malformed elliptic curve private key file could cause a use-after-free\ncondition in the d2i_ECPrivateKey function.  [CVE-2015-0209]\n\nAn attempt to compare ASN.1 boolean types will cause the ASN1_TYPE_cmp\nfunction to crash with an invalid read.  [CVE-2015-0286]\n\nReusing a structure in ASN.1 parsing may allow an attacker to cause memory\ncorruption via an invalid write. [CVE-2015-0287]\n\nThe function X509_to_X509_REQ will crash with a NULL pointer dereference if\nthe certificate key is invalid.  [CVE-2015-0288]\n\nThe PKCS#7 parsing code does not handle missing outer ContentInfo correctly. \n[CVE-2015-0289]\n\nA malicious client can trigger an OPENSSL_assert in servers that both support\nSSLv2 and enable export cipher suites by sending a specially crafted SSLv2\nCLIENT-MASTER-KEY message.  [CVE-2015-0293]\n\nIII.  [CVE-2015-0209]\n\nA remote attacker who is able to send specifically crafted certificates\nmay be able to crash an OpenSSL client or server.  [CVE-2015-0286]\n\nAn attacker who can cause invalid writes with applications that parse\nstructures containing CHOICE or ANY DEFINED BY components and reusing\nthe structures may be able to cause them to crash.  Such reuse is believed\nto be rare.  OpenSSL clients and servers are not affected. [CVE-2015-0287]\n\nAn attacker may be able to crash applications that create a new certificate\nrequest with subject name the same as in an existing, specifically crafted\ncertificate.  This usage is rare in practice.  [CVE-2015-0288]\n\nAn attacker may be able to crash applications that verify PKCS#7 signatures,\ndecrypt PKCS#7 data or otherwise parse PKCS#7 structures with specifically\ncrafted certificates.  [CVE-2015-0289]\n\nA malicious client can trigger an OPENSSL_assert in servers that both support\nSSLv2 and enable export cipher suites by sending a carefully crafted SSLv2\nCLIENT-MASTER-KEY message, resulting in a Denial of Service.  [CVE-2015-0293]\n\nNote that two issues in the original OpenSSL advisory, CVE-2015-0204 and\nCVE-2015-0292, were already addressed by FreeBSD-SA-15:01.openssl and\nFreeBSD-EN-15:02.openssl. \n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 8.4 and FreeBSD 9.3]\n# fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-0.9.8.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-0.9.8.patch.asc\n# gpg --verify openssl-0.9.8.patch.asc\n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-1.0.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:06/openssl-1.0.1.patch.asc\n# gpg --verify openssl-1.0.1.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r280266\nreleng/8.4/                                                       r280268\nstable/9/                                                         r280266\nreleng/9.3/                                                       r280268\nstable/10/                                                        r280266\nreleng/10.1/                                                      r280268\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:https://www.openssl.org/news/secadv_20150319.txt>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293>\n\nThe latest revision of this advisory is available at\n<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:06.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.2 (FreeBSD)\n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\nUQg3YfrXHDlxCsqEzN7o\n=wi0T\n-----END PGP SIGNATURE-----\n. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Storage 2.1. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. Relevant releases/architectures:\n\nRed Hat Storage Server 2.1 - x86_64\n\n3. \n(CVE-2015-0286)\n\nAn integer underflow flaw, leading to a buffer overflow, was found in the\nway OpenSSL decoded malformed Base64-encoded inputs. Note: this flaw is not exploitable via the TLS/SSL protocol because\nthe data being transferred is not Base64-encoded. (CVE-2015-0292)\n\nA denial of service flaw was found in the way OpenSSL handled SSLv2\nhandshake messages. (CVE-2015-0209)\n\nAn out-of-bounds write flaw was found in the way OpenSSL reused certain\nASN.1 structures. (CVE-2015-0289)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292,\nand CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL\ndevelopment team as the original reporter of CVE-2015-0286, Emilia Käsper\nof the OpenSSL development team as the original reporter of CVE-2015-0287,\nBrian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski\nof Google as the original reporter of CVE-2015-0289, Robert Dugal and David\nRamos as the original reporters of CVE-2015-0292, and Sean Burford of\nGoogle and Emilia Käsper of the OpenSSL development team as the original\nreporters of CVE-2015-0293. \n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import\n1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp()\n1202380 - CVE-2015-0287 openssl: ASN.1 structure reuse memory corruption\n1202384 - CVE-2015-0289 openssl: PKCS7 NULL pointer dereference\n1202395 - CVE-2015-0292 openssl: integer underflow leading to buffer overflow in base64 decoding\n1202404 - CVE-2015-0293 openssl: assertion failure in SSLv2 servers\n1202418 - CVE-2015-0288 openssl: X509_to_X509_REQ NULL pointer dereference\n\n6. Package List:\n\nRed Hat Storage Server 2.1:\n\nSource:\nopenssl-1.0.1e-30.el6_6.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.7.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.7.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.7.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-0209\nhttps://access.redhat.com/security/cve/CVE-2015-0286\nhttps://access.redhat.com/security/cve/CVE-2015-0287\nhttps://access.redhat.com/security/cve/CVE-2015-0288\nhttps://access.redhat.com/security/cve/CVE-2015-0289\nhttps://access.redhat.com/security/cve/CVE-2015-0292\nhttps://access.redhat.com/security/cve/CVE-2015-0293\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20150319.txt\nhttps://access.redhat.com/articles/1384453\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. Description:\n\nThis release of Red Hat JBoss Core Services httpd 2.4.23 serves as a\nreplacement for JBoss Core Services Apache HTTP Server 2.4.6. (CVE-2014-8176,\nCVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196,\nCVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799,\nCVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109,\nCVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762,\nCVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837,\nCVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705,\nCVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420,\nCVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459,\nCVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was\nfixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. \n\nSee the corresponding CVE pages linked to in the References section for\nmore information about each of the flaws listed in this advisory. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files). JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0]\nJBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service\n\n6",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
         {
            db: "BID",
            id: "73239",
         },
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "131308",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "133325",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130932",
         },
         {
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-0209",
            trust: 2.9,
         },
         {
            db: "JUNIPER",
            id: "JSA10680",
            trust: 2,
         },
         {
            db: "BID",
            id: "73239",
            trust: 2,
         },
         {
            db: "SECTRACK",
            id: "1031929",
            trust: 1.7,
         },
         {
            db: "MCAFEE",
            id: "SB10110",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.4,
         },
         {
            db: "VULMON",
            id: "CVE-2015-0209",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131045",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130912",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131308",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "133325",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132763",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130932",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131086",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140182",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "BID",
            id: "73239",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "131308",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "133325",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130932",
         },
         {
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   id: "VAR-201503-0052",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.44515337750000006,
   },
   last_update_date: "2024-11-29T20:00:54.816000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "openssl-1.0.0r",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=54508",
         },
         {
            title: "openssl-0.9.8zf",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=54507",
         },
         {
            title: "openssl-1.0.2a",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=54510",
         },
         {
            title: "openssl-1.0.1m",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=54509",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2537-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-498",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-498",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162957 - Security Advisory",
         },
         {
            title: "Tenable Security Advisories: [R6] OpenSSL '20150319' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-04",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=2a43c5799a7dd07d6c0a92a3b040d12f",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150320-openssl",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eaf98750f1130c39e83765575c69e165",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Symantec Security Advisories: SA92 : OpenSSL Security Advisory 19-Mar-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=07adc2b6f5910b64efc7296f227b9f10",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2015-0209 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.1,
            url: "https://www.openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 2,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/articles/1384453",
         },
         {
            trust: 1.8,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0752.html",
         },
         {
            trust: 1.8,
            url: "http://www.securityfocus.com/bid/73239",
         },
         {
            trust: 1.8,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2957.html",
         },
         {
            trust: 1.7,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1196737",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152844.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152733.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152734.html",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2015/dsa-3197",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html",
         },
         {
            trust: 1.7,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-15%3a06.openssl.asc",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html",
         },
         {
            trust: 1.7,
            url: "http://www.ubuntu.com/usn/usn-2537-1",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1031929",
         },
         {
            trust: 1.7,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0716.html",
         },
         {
            trust: 1.7,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:063",
         },
         {
            trust: 1.7,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.7,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0715.html",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/156823.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/157177.html",
         },
         {
            trust: 1.7,
            url: "http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html",
         },
         {
            trust: 1.7,
            url: "http://support.apple.com/kb/ht204942",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa92",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
         },
         {
            trust: 1.7,
            url: "http://rhn.redhat.com/errata/rhsa-2016-1089.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.7,
            url: "https://security.gentoo.org/glsa/201503-11",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10680",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.7,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10110",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.6,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/4885/security-advisory-alienvault-v5-0-",
         },
         {
            trust: 0.3,
            url: "https://support.asperasoft.com/entries/93038317-security-bulletin-vulnerabilities-in-openssl",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04746490",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/apr/37",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/137",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/134",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/136",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04679334",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005226",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005241",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005254",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21958089",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962334",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098144",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020693",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21958903",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963024",
         },
         {
            trust: 0.3,
            url: "https://www.openssl.org/news/vulnerabilities.html",
         },
         {
            trust: 0.3,
            url: "http://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2015-04-16.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903752",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701028",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963783",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=swg21701256",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10680&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21882710",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022183",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964164",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903799",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022382",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099273",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902449",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902277",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21882644",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21957903",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902544",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21702160",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022367",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883028",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699778",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020716",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902673",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883593",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099272",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700167",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902433",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005257",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21722409",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700411",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960212",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960210",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21883249",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964410",
         },
         {
            trust: 0.3,
            url: "https://support.f5.com/kb/en-us/solutions/public/16000/300/sol16323.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=630&uid=swg21970748",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960588",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960668",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903261",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21694849",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903729",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701326",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701334",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21882955",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.3,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3523",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.2,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.2,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.2,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0292",
         },
         {
            trust: 0.2,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0207",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0118",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8142",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0226",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0231",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0285",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9653",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9705",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0232",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9427",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0208",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0273",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0231",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9652",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0209",
         },
         {
            trust: 0.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2537-1/",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150320-openssl",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=39581",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall_patchaccess",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayinstallinfo.do?product",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04746490&la",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1692",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/go/insightupdates",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-0248",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5107",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04765169",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04762744",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/go/smh",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:06/openssl-1.0.1.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:06/openssl-0.9.8.patch",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287>",
         },
         {
            trust: 0.1,
            url: "https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-15:06.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209>",
         },
         {
            trust: 0.1,
            url: "https://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:06/openssl-1.0.1.patch",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20150319.txt>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:06/openssl-0.9.8.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288>",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0292",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://issues.jboss.org/):",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3196",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4448",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0702",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0797",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6808",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1835",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-3705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1838",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3196",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1839",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4483",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3523",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2842",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-8612",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2012-1148",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1840",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0797",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1836",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3185",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1833",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp&downloadtype=distributions&version=2.4.23",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1840",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1836",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1762",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1835",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4449",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1762",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-5420",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-3627",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2012-1148",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1837",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1834",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1837",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1839",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-5419",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4459",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0702",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1838",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1833",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1834",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4447",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-7141",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0799",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "BID",
            id: "73239",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "131308",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "133325",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130932",
         },
         {
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            db: "BID",
            id: "73239",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "131308",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "133325",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130932",
         },
         {
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-03-19T00:00:00",
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "BID",
            id: "73239",
         },
         {
            date: "2015-03-27T20:43:39",
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            date: "2015-03-20T04:42:01",
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            date: "2015-04-07T15:56:20",
            db: "PACKETSTORM",
            id: "131308",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2015-08-26T01:35:08",
            db: "PACKETSTORM",
            id: "133325",
         },
         {
            date: "2015-07-21T13:37:51",
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            date: "2015-03-20T05:41:10",
            db: "PACKETSTORM",
            id: "130932",
         },
         {
            date: "2015-03-30T21:19:09",
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            date: "2016-12-16T16:34:49",
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            date: "2015-03-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            date: "2015-03-19T22:59:02.617000",
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2015-0209",
         },
         {
            date: "2017-05-23T16:24:00",
            db: "BID",
            id: "73239",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
         {
            date: "2024-11-21T02:22:33.237000",
            db: "NVD",
            id: "CVE-2015-0209",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "131086",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL ‘ d2i_ECPrivateKey 'Reuse the function after the release of the vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-396",
         },
      ],
      trust: 0.6,
   },
}

var-201408-0090
Vulnerability from variot

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions. OpenSSL is prone to an information disclosure vulnerability. An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks. The following versions are vulnerable: OpenSSL 0.9.8 versions prior to 0.9.8zb. OpenSSL 1.0.0 versions prior to 1.0.0n. OpenSSL 1.0.1 versions prior to 1.0.1i. OpenSSL Security Advisory [6 Aug 2014] ========================================

Information leak in pretty printing functions (CVE-2014-3508)

A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.

Thanks to Ivan Fratric (Google) for discovering this issue. This issue was reported to OpenSSL on 19th June 2014.

The fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL development team.

Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)

The issue affects OpenSSL clients and allows a malicious server to crash the client with a null pointer dereference (read) by specifying an SRP ciphersuite even though it was not properly negotiated with the client. This can be exploited through a Denial of Service attack.

OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and researching this issue. This issue was reported to OpenSSL on 2nd July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)

If a multithreaded client connects to a malicious server using a resumed session and the server sends an ec point format extension it could write up to 255 bytes to freed memory.

OpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this issue. This issue was reported to OpenSSL on 8th July 2014.

The fix was developed by Gabor Tyukasz.

Double Free when processing DTLS packets (CVE-2014-3505)

An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley and Wan-Teh Chang (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley.

DTLS memory exhaustion (CVE-2014-3506)

An attacker can force openssl to consume large amounts of memory whilst processing DTLS handshake messages. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley.

DTLS memory leak from zero-length fragments (CVE-2014-3507)

By sending carefully crafted DTLS packets an attacker could cause openssl to leak memory. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley.

OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)

OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages.

OpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i.

Thanks to Felix Gröbert (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 18th July 2014.

The fix was developed by Emilia Käsper of the OpenSSL development team.

OpenSSL TLS protocol downgrade attack (CVE-2014-3511)

A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate TLS 1.0 instead of higher protocol versions when the ClientHello message is badly fragmented. This allows a man-in-the-middle attacker to force a downgrade to TLS 1.0 even if both the server and the client support a higher protocol version, by modifying the client's TLS records.

OpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i.

Thanks to David Benjamin and Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 21st July 2014.

The fix was developed by David Benjamin.

SRP buffer overrun (CVE-2014-3512)

A malicious client or server can send invalid SRP parameters and overrun an internal buffer. Only applications which are explicitly set up for SRP use are affected.

Thanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC Group) for discovering this issue. This issue was reported to OpenSSL on 31st July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20140806.txt

Note: the online version of the advisory may be updated with additional details over time.

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz: Upgraded. ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 30bdc015b10d8891b90d3f6ea34f5fdd openssl-0.9.8zb-i486-1_slack13.0.txz 3dc4140c22c04c94e5e74386a5a1c200 openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 3da32f51273762d67bf9dbcc91af9413 openssl-0.9.8zb-x86_64-1_slack13.0.txz 075e5d12e5b909ecac923cb210f83544 openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 3b7e2bb2b317bf72b8f9b2b7a14bddfb openssl-0.9.8zb-i486-1_slack13.1.txz 92af0784eade0674332a56bfab73b97d openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: df5f961109d7b50971660ca6a7d4c48c openssl-0.9.8zb-x86_64-1_slack13.1.txz 582aaeae3d56730a2e1538a67d4e44da openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 546445d56d3b367fa0dd4e80859c4620 openssl-0.9.8zb-i486-1_slack13.37.txz b80e9df8cdd0649939ec2fab20d24691 openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 9c9ce97dc21340924a3e27c1a8047023 openssl-0.9.8zb-x86_64-1_slack13.37.txz 0fe1931f2fc82fb8d5fbe72680caf843 openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Slackware 14.0 packages: d1580f4b22b99cee42b22276653c8180 openssl-1.0.1i-i486-1_slack14.0.txz ec93cec2bcab8ae7391a504573cbc231 openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 329475de3759225b1d02aa7317b2eb58 openssl-1.0.1i-x86_64-1_slack14.0.txz 25f2a198022d974534986a3913ca705c openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 8336457bc31d44ebf502ffc4443f12f7 openssl-1.0.1i-i486-1_slack14.1.txz 4b99ac357fbd3065c53367eea246b8c7 openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: f2b8f81d9d7dc02e5d1011f663ccc95d openssl-1.0.1i-x86_64-1_slack14.1.txz 4360abffbb57cb18ba0720f782d78250 openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Slackware -current packages: 49ecd332a899cf742d3467a6efe44269 a/openssl-solibs-1.0.1i-i486-1.txz 27da017c49045981b1793f105aff365f n/openssl-1.0.1i-i486-1.txz

Slackware x86_64 -current packages: 8d74f3d770802182137c84d925f58cbc a/openssl-solibs-1.0.1i-x86_64-1.txz fd9d94d3210f0aedf74959cb0887e2b8 n/openssl-1.0.1i-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Description:

Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. Solution:

The References section of this erratum contains a download link (you must log in to download the update). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04424322

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04424322 Version: 1

HPSBGN03099 rev.1 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-09-01 Last Updated: 2014-09-01

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL.

HP IceWall SSO Agent Option v8.0, v8.0 2007 Update Release 2, and v10.0 HP IceWall MCRP v2.1, v3.0 HP IceWall SSO Dfw v8.0, v8.0 R1, v8.0 R2, v8.0 R3, and v10.0

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP recommends the following software update options to resolve this vulnerability for HP IceWall SSO Dfw, SSO Agent and MCRP. HP IceWall SSO Agent and MCRP

- OpenSSL patches are available for RHEL:

https://access.redhat.com/security/cve/CVE-2014-3508

- OpenSSL patches are available for HP-UX.

  Please refer to HP Security Bulletin HPSBUX03095: https://h20564.www2.h

p.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04404655

  1. HP IceWall SSO Dfw

    Updated OpenSSL is available for the HP IceWall SSO Dfw Bundle: http://www.hp.com/jp/icewall/_patchaccess

HP recommends the following mitigation information to protect against potential risk for the following HP IceWall products.

HP IceWall SSO Dfw and MCRP

If possible, do not use SHOST setting which allows IceWall SSO Dfw or

MCRP to use SSL/TLS for back-end web server connection.

HP IceWall SSO Dfw

If possible, do not use SHOST and set CC_DECODE_FLG to 0 which will

disable certificate decode by HP IceWall SSO Dfw .

Note: The HP IceWall product is only available in Japan.

HISTORY Version:1 (rev.1) - 2 September 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security update Advisory ID: RHSA-2014:1053-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1053.html Issue date: 2014-08-13 CVE Names: CVE-2014-0221 CVE-2014-3505 CVE-2014-3506 CVE-2014-3508 CVE-2014-3510 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.

It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508)

Multiple flaws were discovered in the way OpenSSL handled DTLS packets. (CVE-2014-0221, CVE-2014-3505, CVE-2014-3506)

A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. (CVE-2014-3510)

Red Hat would like to thank the OpenSSL project for reporting CVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue.

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake 1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions 1127499 - CVE-2014-3505 openssl: DTLS packet processing double free 1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion 1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-0.9.8e-27.el5_10.4.i386.rpm openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-perl-0.9.8e-27.el5_10.4.i386.rpm

x86_64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.x86_64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm

Red Hat Enterprise Linux Desktop Workstation (v. 5 client):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm

x86_64: openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-0.9.8e-27.el5_10.4.i386.rpm openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-perl-0.9.8e-27.el5_10.4.i386.rpm

ia64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.ia64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ia64.rpm openssl-devel-0.9.8e-27.el5_10.4.ia64.rpm openssl-perl-0.9.8e-27.el5_10.4.ia64.rpm

ppc: openssl-0.9.8e-27.el5_10.4.ppc.rpm openssl-0.9.8e-27.el5_10.4.ppc64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ppc.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ppc64.rpm openssl-devel-0.9.8e-27.el5_10.4.ppc.rpm openssl-devel-0.9.8e-27.el5_10.4.ppc64.rpm openssl-perl-0.9.8e-27.el5_10.4.ppc.rpm

s390x: openssl-0.9.8e-27.el5_10.4.s390.rpm openssl-0.9.8e-27.el5_10.4.s390x.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.s390.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.s390x.rpm openssl-devel-0.9.8e-27.el5_10.4.s390.rpm openssl-devel-0.9.8e-27.el5_10.4.s390x.rpm openssl-perl-0.9.8e-27.el5_10.4.s390x.rpm

x86_64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.x86_64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm openssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2014-0221.html https://www.redhat.com/security/data/cve/CVE-2014-3505.html https://www.redhat.com/security/data/cve/CVE-2014-3506.html https://www.redhat.com/security/data/cve/CVE-2014-3508.html https://www.redhat.com/security/data/cve/CVE-2014-3510.html https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20140605.txt https://www.openssl.org/news/secadv_20140806.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFT69sGXlSAg2UNWIIRAuZjAJ9R5VuNKxbsx8+T/WGZrkH1VheAqgCdHHXN vrHSSMIJuncazkJWPE/LOyQ= =/f7Y -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .

The updated packages have been upgraded to the 1.0.0n version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510 http://www.openssl.org/news/secadv_20140806.txt


Updated Packages:

Mandriva Business Server 1/X86_64: 17007f558e739eb863c8507d520ffbc9 mbs1/x86_64/lib64openssl1.0.0-1.0.0n-1.mbs1.x86_64.rpm f810bbe20b2de26cb99d13ddaf0ac2fa mbs1/x86_64/lib64openssl-devel-1.0.0n-1.mbs1.x86_64.rpm 54d87a61ca0440dc5f344931de1ff43e mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0n-1.mbs1.x86_64.rpm 5b1748370e5a855cc31d3eec7673da5e mbs1/x86_64/lib64openssl-static-devel-1.0.0n-1.mbs1.x86_64.rpm 7e19a555629b4a2d3d4533be7786ce5e mbs1/x86_64/openssl-1.0.0n-1.mbs1.x86_64.rpm a9e74f2bab2878f601cfb44620c76dbb mbs1/SRPMS/openssl-1.0.0n-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFT5HsDmqjQ0CJFipgRAhA5AJ0ZoDe2+SA7K7xk+NZLedQBVoFVvgCffPW9 5geoq7aMnxbnw5eTuuH+iIs= =CK7e -----END PGP SIGNATURE----- . These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), allow unauthorized access. The updates are available from https://h20392.www2.hp.com/portal/swdepot/displayP roductInfo.do?productNumber=OPENSSL11I

HP-UX Release HP-UX OpenSSL version

B.11.11 (11i v1) OpenSSL_A.00.09.08zb.001_HP-UX_B.11.11_32_64.depot

B.11.23 (11i v2) OpenSSL_A.00.09.08zb.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) OpenSSL_A.00.09.08zb.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install OpenSSL A.00.09.08zb or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

Detailed descriptions of the vulnerabilities can be found at: https://www.openssl.org/news/secadv_20140806.txt

It's important that you upgrade the libssl1.0.0 package and not just the openssl package. Alternatively, you may reboot your system.

For the testing distribution (jessie), these problems will be fixed soon. Corrected: 2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE) 2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8) 2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE) 2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1) 2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11) 2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18) 2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE) 2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15) CVE Name: CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510, CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-5139]

III. Additionally, a remote attacker may be able to run arbitrary code on a vulnerable system if the application has been set up for SRP.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc

gpg --verify openssl-10.0.patch.asc

[FreeBSD 9.3]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc

gpg --verify openssl-9.3.patch.asc

[FreeBSD 9.2, 9.1, 8.4]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc

gpg --verify openssl-9.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r269687 releng/8.4/ r271305 stable/9/ r269687 releng/9.1/ r271305 releng/9.2/ r271305 releng/9.3/ r271305 stable/10/ r269686 releng/10.0/ r271304


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. The HP Insight Control 7.2.1 Update kit applicable to HP Insight Control 7.2.x installations is available at the following location:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =HPICE

NOTE: Please read the readme.txt file before proceeding with the installation

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201408-0090",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8w",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8y",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8u",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "8.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "-release-p2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "8.4-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.016",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.7",
         },
         {
            model: "8.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.2-release-p11",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.0",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "vios fp-25 sp-02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.3-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7530061.121.225.06100",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.2",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "7.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "7.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79120",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "jboss web server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2.1.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2407863",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79180",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35007383",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "release-p4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78450",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "72250",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "9.1-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2207906",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.14",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "hp-ux b.11.23 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v2)",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "-release/alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "8.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.1",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.00",
         },
         {
            model: "9.2-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "linerate",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.3.2",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78350",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "9.1--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79130",
         },
         {
            model: "6.3-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "9.3-beta3-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "72200",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57350",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7556061.121.225.06100",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.1c",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "9.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "-stablepre2001-07-20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.0",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5855072.060.134.32804",
         },
         {
            model: "8.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "6.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x33007382",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.1",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "7.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.2",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "7.0-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "9.0-rc3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.3",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78300",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x638370",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "7.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.13",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.4",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "7.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75300",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "9.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7955",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "nextscale nx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "54550",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.08",
         },
         {
            model: "7.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.015",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2x",
         },
         {
            model: "7.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.0-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.5",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408738",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5875072.060.134.32804",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.01",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75450",
         },
         {
            model: "8.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0.x",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1.3",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.3-rc",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "9.3-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "8.4-release-p13",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "enterprise linux desktop client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9301072.180.134.32804",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "-pre-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura communication manager utility services sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.16.1.0.9.8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x365079150",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75560",
         },
         {
            model: "8.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "enterprise linux load balancer eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.3-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58750",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.6",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35507914",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "8.3-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.9",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "9.1-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.3",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "7.3-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.2-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4.0.15",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3x",
         },
         {
            model: "9.3-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "8.3-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "-stablepre2002-03-07",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.00",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0.11",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087330",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.2",
         },
         {
            model: "8.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.3",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "7.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "8.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.0",
         },
         {
            model: "7.3-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "6.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "89000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "7.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "8.3-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2202585",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "10.0-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.6.4",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "9.1-release-p17",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75250",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7525061.121.225.06100",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-release-p1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7835072.010.134.32804",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.5.0.15",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "8-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.4",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6.9",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2227916",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "-release-p6",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "qradar risk manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "8.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "8.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "7.1-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.4",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "8.4-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2-",
         },
         {
            model: "9.1-release-p18",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.20",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "7.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1i",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4x",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0.x",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "7.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.9",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "10.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "hp-ux b.11.11 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v1)",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.4",
         },
         {
            model: "6.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8804259",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.1-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-493",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.4.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "7.0-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x37508752",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "8700072.161.134.32804",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "8.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "8.5",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.4",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "8.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "6.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5x",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.3",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36307158",
         },
         {
            model: "7.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5745061.132.224.35203",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3.2",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7830072.010.134.32804",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93020",
         },
         {
            model: "10.0-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "puredata system for operational analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "8.1-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "bladecenter advanced management module 3.66g",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58550",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "8900072.161.134.32804",
         },
         {
            model: "linerate",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.4.1",
         },
         {
            model: "9.3-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "qradar vulnerability manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1x",
         },
         {
            model: "9.3-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408737",
         },
         {
            model: "9.0--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "7.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9302072.180.134.32804",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0.x",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.01",
         },
         {
            model: "9.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "3655072.060.134.32804",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "release -p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2-",
         },
         {
            model: "8.1-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57550",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "9.3-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tivoli netcool system service monitor fp14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2x",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "7.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.2.1",
         },
         {
            model: "8-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "7.3-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.2",
         },
         {
            model: "8.2-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x32502583",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "9.2-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93030",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5755061.132.224.35203",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1.4",
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7225072.030.134.32804",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x31002582",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "6.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58450",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5845072.060.134.32804",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1x",
         },
         {
            model: "9.3-release-p1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "8.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.0",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.16",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5740061.132.224.35203",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57450",
         },
         {
            model: "8.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "87000",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x310054570",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "9.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "icewall sso agent option update rele",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35307160",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "7.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.5",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.02",
         },
         {
            model: "7.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8400",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "36550",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "release p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3--",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "5.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7535061.121.225.06100",
         },
         {
            model: "release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p10",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087180",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "66550",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.14",
         },
         {
            model: "9.3-beta1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.6",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.6.2",
         },
         {
            model: "cms r17ac.g",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78550",
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79190",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x638370",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.0",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57400",
         },
         {
            model: "websphere mq advanced message security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "-8.0.0.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "hp-ux b.11.31 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v3)",
         },
         {
            model: "9.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408956",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8731",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93010",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.17",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.2",
         },
         {
            model: "linerate",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8807903",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "9.2-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36305466",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "7.0-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.6",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7845072.040.134.32804",
         },
         {
            model: "qradar risk manager mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.0.9.8",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7545061.121.225.06100",
         },
         {
            model: "10.0-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x4407917",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v8400",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36505460",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087220",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8734",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "79700",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.5",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "9.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7970072.200.134.32804",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75350",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7220072.030.134.32804",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9303072.180.134.32804",
         },
         {
            model: "enterprise linux desktop workstation client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5735061.132.224.35203",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.0d5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2",
         },
         {
            model: "8.2-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x325054580",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7855072.040.134.32804",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "6655072.060.134.32804",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "6.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "6.4-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.07",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Ivan Fratric of Google",
      sources: [
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2014-3508",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3508",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3508",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201408-132",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3508",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions. OpenSSL is prone to an information disclosure vulnerability. \nAn attacker can exploit this issue to gain access to sensitive information that may aid in further attacks. \nThe following versions are vulnerable:\nOpenSSL 0.9.8 versions prior to 0.9.8zb. \nOpenSSL 1.0.0 versions prior  to 1.0.0n. \nOpenSSL 1.0.1 versions prior  to 1.0.1i. OpenSSL Security Advisory [6 Aug 2014]\n========================================\n\nInformation leak in pretty printing functions (CVE-2014-3508)\n=============================================================\n\nA flaw in OBJ_obj2txt may cause pretty printing functions such as\nX509_name_oneline, X509_name_print_ex et al. to leak some information from the\nstack. Applications may be affected if they echo pretty printing output to the\nattacker. OpenSSL SSL/TLS clients and servers themselves are not affected. \n\nThanks to Ivan Fratric (Google) for discovering this issue. This issue\nwas reported to OpenSSL on 19th June 2014. \n\nThe fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL\ndevelopment team. \n\n\nCrash with SRP ciphersuite in Server Hello message (CVE-2014-5139)\n==================================================================\n\nThe issue affects OpenSSL clients and allows a malicious server to crash\nthe client with a null pointer dereference (read) by specifying an SRP\nciphersuite even though it was not properly negotiated with the client. This can\nbe exploited through a Denial of Service attack. \n\nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 2nd July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\n\nRace condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)\n==============================================================\n\nIf a multithreaded client connects to a malicious server using a resumed session\nand the server sends an ec point format extension it could write up to 255 bytes\nto freed memory. \n\nOpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this\nissue. This issue was reported to OpenSSL on 8th July 2014. \n\nThe fix was developed by Gabor Tyukasz. \n\n\nDouble Free when processing DTLS packets (CVE-2014-3505)\n========================================================\n\nAn attacker can force an error condition which causes openssl to crash whilst\nprocessing DTLS packets due to memory being freed twice. This can be exploited\nthrough a Denial of Service attack. \n\nThanks to Adam Langley and Wan-Teh Chang (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 6th June\n2014. \n\nThe fix was developed by Adam Langley. \n\n\nDTLS memory exhaustion (CVE-2014-3506)\n======================================\n\nAn attacker can force openssl to consume large amounts of memory whilst\nprocessing DTLS handshake messages. This can be exploited through a Denial of\nService attack. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. \n\n\nDTLS memory leak from zero-length fragments (CVE-2014-3507)\n===========================================================\n\nBy sending carefully crafted DTLS packets an attacker could cause openssl to\nleak memory. This can be exploited through a Denial of Service attack. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. \n\nOpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)\n===============================================================\n\nOpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a\ndenial of service attack. A malicious server can crash the client with a null\npointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and\nsending carefully crafted handshake messages. \n\nOpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i. \n\nThanks to Felix Gröbert (Google) for discovering and researching this issue. \nThis issue was reported to OpenSSL on 18th July 2014. \n\nThe fix was developed by Emilia Käsper of the OpenSSL development team. \n\n\nOpenSSL TLS protocol downgrade attack (CVE-2014-3511)\n=====================================================\n\nA flaw in the OpenSSL SSL/TLS server code causes the server to negotiate\nTLS 1.0 instead of higher protocol versions when the ClientHello message is\nbadly fragmented. This allows a man-in-the-middle attacker to force a\ndowngrade to TLS 1.0 even if both the server and the client support a higher\nprotocol version, by modifying the client's TLS records. \n\nOpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i. \n\nThanks to David Benjamin and Adam Langley (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 21st July 2014. \n\nThe fix was developed by David Benjamin. \n\n\nSRP buffer overrun (CVE-2014-3512)\n==================================\n\nA malicious client or server can send invalid SRP parameters and overrun\nan internal buffer. Only applications which are explicitly set up for SRP\nuse are affected. \n\nThanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC\nGroup) for discovering this issue. This issue was reported to OpenSSL\non 31st July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20140806.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1i-i486-1_slack14.1.txz:  Upgraded. \n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n30bdc015b10d8891b90d3f6ea34f5fdd  openssl-0.9.8zb-i486-1_slack13.0.txz\n3dc4140c22c04c94e5e74386a5a1c200  openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n3da32f51273762d67bf9dbcc91af9413  openssl-0.9.8zb-x86_64-1_slack13.0.txz\n075e5d12e5b909ecac923cb210f83544  openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n3b7e2bb2b317bf72b8f9b2b7a14bddfb  openssl-0.9.8zb-i486-1_slack13.1.txz\n92af0784eade0674332a56bfab73b97d  openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\ndf5f961109d7b50971660ca6a7d4c48c  openssl-0.9.8zb-x86_64-1_slack13.1.txz\n582aaeae3d56730a2e1538a67d4e44da  openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n546445d56d3b367fa0dd4e80859c4620  openssl-0.9.8zb-i486-1_slack13.37.txz\nb80e9df8cdd0649939ec2fab20d24691  openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n9c9ce97dc21340924a3e27c1a8047023  openssl-0.9.8zb-x86_64-1_slack13.37.txz\n0fe1931f2fc82fb8d5fbe72680caf843  openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nd1580f4b22b99cee42b22276653c8180  openssl-1.0.1i-i486-1_slack14.0.txz\nec93cec2bcab8ae7391a504573cbc231  openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n329475de3759225b1d02aa7317b2eb58  openssl-1.0.1i-x86_64-1_slack14.0.txz\n25f2a198022d974534986a3913ca705c  openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n8336457bc31d44ebf502ffc4443f12f7  openssl-1.0.1i-i486-1_slack14.1.txz\n4b99ac357fbd3065c53367eea246b8c7  openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nf2b8f81d9d7dc02e5d1011f663ccc95d  openssl-1.0.1i-x86_64-1_slack14.1.txz\n4360abffbb57cb18ba0720f782d78250  openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n49ecd332a899cf742d3467a6efe44269  a/openssl-solibs-1.0.1i-i486-1.txz\n27da017c49045981b1793f105aff365f  n/openssl-1.0.1i-i486-1.txz\n\nSlackware x86_64 -current packages:\n8d74f3d770802182137c84d925f58cbc  a/openssl-solibs-1.0.1i-x86_64-1.txz\nfd9d94d3210f0aedf74959cb0887e2b8  n/openssl-1.0.1i-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. Description:\n\nRed Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04424322\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04424322\nVersion: 1\n\nHPSBGN03099 rev.1 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL,\nRemote Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-09-01\nLast Updated: 2014-09-01\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP IceWall SSO\nDfw, SSO Agent and MCRP running OpenSSL. \n\nHP IceWall SSO Agent Option v8.0, v8.0 2007 Update Release 2, and v10.0\nHP IceWall MCRP v2.1, v3.0\nHP IceWall SSO Dfw v8.0, v8.0 R1, v8.0 R2, v8.0 R3, and v10.0\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-3508    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP recommends the following software update options to resolve this\nvulnerability for HP IceWall SSO Dfw, SSO Agent and MCRP. HP IceWall SSO Agent and MCRP\n\n    - OpenSSL patches are available for RHEL:\nhttps://access.redhat.com/security/cve/CVE-2014-3508\n\n    - OpenSSL patches are available for HP-UX. \n\n      Please refer to HP Security Bulletin HPSBUX03095: https://h20564.www2.h\np.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04404655\n\n  2. HP IceWall SSO Dfw\n\n    Updated OpenSSL is available for the HP IceWall SSO Dfw Bundle:\nhttp://www.hp.com/jp/icewall/_patchaccess\n\nHP recommends the following mitigation information to protect against\npotential risk for the following HP IceWall products. \n\n  HP IceWall SSO Dfw and MCRP\n\n    If possible, do not use SHOST setting which allows IceWall SSO Dfw or\nMCRP to use SSL/TLS for back-end web server connection. \n\n  HP IceWall SSO Dfw\n\n    If possible, do not use SHOST and set CC_DECODE_FLG to 0 which will\ndisable certificate decode by HP IceWall SSO Dfw . \n\nNote: The HP IceWall product is only available in Japan. \n\nHISTORY\nVersion:1 (rev.1) - 2 September 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security update\nAdvisory ID:       RHSA-2014:1053-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-1053.html\nIssue date:        2014-08-13\nCVE Names:         CVE-2014-0221 CVE-2014-3505 CVE-2014-3506 \n                   CVE-2014-3508 CVE-2014-3510 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nIt was discovered that the OBJ_obj2txt() function could fail to properly\nNUL-terminate its output. This could possibly cause an application using\nOpenSSL functions to format fields of X.509 certificates to disclose\nportions of its memory. (CVE-2014-3508)\n\nMultiple flaws were discovered in the way OpenSSL handled DTLS packets. (CVE-2014-0221,\nCVE-2014-3505, CVE-2014-3506)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed a\nhandshake when using the anonymous Diffie-Hellman (DH) key exchange. (CVE-2014-3510)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original\nreporter of this issue. \n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake\n1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions\n1127499 - CVE-2014-3505 openssl: DTLS packet processing double free\n1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion\n1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.i386.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\n\nx86_64:\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.i386.rpm\n\nia64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.ia64.rpm\n\nppc:\nopenssl-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.ppc.rpm\n\ns390x:\nopenssl-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.s390x.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-0221.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3505.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3506.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3508.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3510.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20140605.txt\nhttps://www.openssl.org/news/secadv_20140806.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFT69sGXlSAg2UNWIIRAuZjAJ9R5VuNKxbsx8+T/WGZrkH1VheAqgCdHHXN\nvrHSSMIJuncazkJWPE/LOyQ=\n=/f7Y\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n \n The updated packages have been upgraded to the 1.0.0n version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510\n http://www.openssl.org/news/secadv_20140806.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 17007f558e739eb863c8507d520ffbc9  mbs1/x86_64/lib64openssl1.0.0-1.0.0n-1.mbs1.x86_64.rpm\n f810bbe20b2de26cb99d13ddaf0ac2fa  mbs1/x86_64/lib64openssl-devel-1.0.0n-1.mbs1.x86_64.rpm\n 54d87a61ca0440dc5f344931de1ff43e  mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0n-1.mbs1.x86_64.rpm\n 5b1748370e5a855cc31d3eec7673da5e  mbs1/x86_64/lib64openssl-static-devel-1.0.0n-1.mbs1.x86_64.rpm\n 7e19a555629b4a2d3d4533be7786ce5e  mbs1/x86_64/openssl-1.0.0n-1.mbs1.x86_64.rpm \n a9e74f2bab2878f601cfb44620c76dbb  mbs1/SRPMS/openssl-1.0.0n-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFT5HsDmqjQ0CJFipgRAhA5AJ0ZoDe2+SA7K7xk+NZLedQBVoFVvgCffPW9\n5geoq7aMnxbnw5eTuuH+iIs=\n=CK7e\n-----END PGP SIGNATURE-----\n. These vulnerabilities could be exploited remotely to create a Denial\nof Service (DoS), allow unauthorized access. The\nupdates are available from https://h20392.www2.hp.com/portal/swdepot/displayP\nroductInfo.do?productNumber=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n OpenSSL_A.00.09.08zb.001_HP-UX_B.11.11_32_64.depot\n\nB.11.23 (11i v2)\n OpenSSL_A.00.09.08zb.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n OpenSSL_A.00.09.08zb.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08zb or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nDetailed descriptions of the vulnerabilities can be found at:\nhttps://www.openssl.org/news/secadv_20140806.txt\n\nIt's important that you upgrade the libssl1.0.0 package and not just\nthe openssl package. Alternatively, you may reboot your system. \n\nFor the testing distribution (jessie), these problems will be fixed\nsoon. \nCorrected:      2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE)\n                2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8)\n                2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE)\n                2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1)\n                2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11)\n                2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18)\n                2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE)\n                2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15)\nCVE Name:       CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510,\n                CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-5139]\n\nIII.  Additionally, a remote attacker may be able\nto run arbitrary code on a vulnerable system if the application has been\nset up for SRP. \n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 9.2, 9.1, 8.4]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc\n# gpg --verify openssl-9.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r269687\nreleng/8.4/                                                       r271305\nstable/9/                                                         r269687\nreleng/9.1/                                                       r271305\nreleng/9.2/                                                       r271305\nreleng/9.3/                                                       r271305\nstable/10/                                                        r269686\nreleng/10.0/                                                      r271304\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. The HP Insight Control 7.2.1\nUpdate kit applicable to HP Insight Control 7.2.x installations is available\nat the following location:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=HPICE\n\nNOTE: Please read the readme.txt file before proceeding with the\ninstallation",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "128131",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "PACKETSTORM",
            id: "127799",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127869",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3508",
            trust: 3.5,
         },
         {
            db: "BID",
            id: "69075",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59700",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61100",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60803",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59710",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60410",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61214",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60917",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61017",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60921",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60022",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60824",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60938",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59743",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61250",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59756",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61959",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60861",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58962",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61171",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61775",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60778",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60684",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61184",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60687",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61392",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60493",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1030693",
            trust: 1.1,
         },
         {
            db: "TENABLE",
            id: "TNS-2014-06",
            trust: 1.1,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-24443",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3508",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130868",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128214",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127803",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127940",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127869",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128387",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127799",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132085",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137292",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127862",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128131",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132081",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128297",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127811",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169648",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "127869",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127799",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128131",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   id: "VAR-201408-0090",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.38333333,
   },
   last_update_date: "2024-11-27T21:56:52.152000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "openssl-0.9.8zb",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51694",
         },
         {
            title: "openssl-1.0.1i",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51696",
         },
         {
            title: "openssl-1.0.0n",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51695",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2308-1",
         },
         {
            title: "Debian Security Advisories: DSA-2998-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=bfd576c692d8814b2a331baf29ad367c",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-391",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-391",
         },
         {
            title: "Symantec Security Advisories: SA85 : OpenSSL Security Advisory 06-Aug-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=02a206cf2efb06aecdaf29aeca851b55",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "BinSeeker",
            trust: 0.1,
            url: "https://github.com/buptsseGJ/BinSeeker ",
         },
         {
            title: "oval",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/oval ",
         },
         {
            title: "wormhole",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/wormhole ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "https://www.openssl.org/news/secadv_20140806.txt",
         },
         {
            trust: 1.5,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1256.html",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            trust: 1.4,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.4,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:18.openssl.asc",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1297.html",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-008.txt.asc",
         },
         {
            trust: 1.1,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1052.html",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1053.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140973896703549&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58962",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59700",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59710",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59743",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59756",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60022",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60410",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60493",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60684",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60687",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60778",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60803",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60824",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60861",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60917",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60921",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60938",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61017",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61100",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61171",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61184",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61214",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61250",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61392",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61775",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61959",
         },
         {
            trust: 1.1,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-2998",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:158",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/69075",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1030693",
         },
         {
            trust: 1.1,
            url: "http://www.tenable.com/security/tns-2014-06",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21681752",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 1.1,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127490",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95165",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-september/000196.html",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3507",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/solutions/len-24443",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3512",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.5,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1054.html",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3505.html",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3506.html",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3508.html",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3510.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682663",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021317",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wan_boot",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004917",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21681752",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004931",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004872",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/84",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/feb/151",
         },
         {
            trust: 0.3,
            url: "aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182969",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04424322",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04426586",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04404655",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21684570",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2deee-50da9c14daae3/cert_mini_security_bulletin_xrx15a_v1-01.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685467",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097658",
         },
         {
            trust: 0.3,
            url: "https://bto.bluecoat.com/security-advisory/sa85",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182784",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1052.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684913",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691005",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963783",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097903",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098264",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098252",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098585",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689886",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686182",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685967",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096510",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687099",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685043",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html?ref=rss",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966557",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.2,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3505",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87",
         },
         {
            trust: 0.1,
            url: "https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://github.com/buptssegj/binseeker",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2308-1/",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=35202",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140806.txt>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:18.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayp",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3509.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3507.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3511.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.3",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7995",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2007-6750",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3237",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2015",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0728",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7547",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2011-4969",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightcontrol",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1053.html",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.h",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall/_patchaccess",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=2.1.0",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "127869",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127799",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128131",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            db: "BID",
            id: "69075",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "127869",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127799",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128131",
         },
         {
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-13T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            date: "2014-08-06T00:00:00",
            db: "BID",
            id: "69075",
         },
         {
            date: "2015-03-18T00:44:34",
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            date: "2014-09-09T17:32:22",
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            date: "2014-08-08T21:50:05",
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            date: "2014-08-20T15:20:13",
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            date: "2014-08-14T22:49:56",
            db: "PACKETSTORM",
            id: "127869",
         },
         {
            date: "2014-09-25T00:05:16",
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            date: "2014-08-08T21:48:03",
            db: "PACKETSTORM",
            id: "127799",
         },
         {
            date: "2015-05-29T23:37:43",
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            date: "2016-06-02T19:12:12",
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            date: "2014-08-14T02:25:06",
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            date: "2014-09-03T21:23:53",
            db: "PACKETSTORM",
            id: "128131",
         },
         {
            date: "2015-05-29T23:37:11",
            db: "PACKETSTORM",
            id: "132081",
         },
         {
            date: "2014-09-17T20:46:27",
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            date: "2014-08-11T11:11:00",
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            date: "2014-08-06T12:12:12",
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            date: "2014-08-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            date: "2014-08-13T23:55:07.497000",
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-11-15T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3508",
         },
         {
            date: "2016-09-09T15:00:00",
            db: "BID",
            id: "69075",
         },
         {
            date: "2022-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
         {
            date: "2024-11-21T02:08:15.720000",
            db: "NVD",
            id: "CVE-2014-3508",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
      ],
      trust: 0.8,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL Information disclosure vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-132",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0593
Vulnerability from variot

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. Servers with a default configuration are vulnerable even if they do not support OCSP. Builds using the "no-ocsp" build time option are not affected.

Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support.

OpenSSL 1.1.0 users should upgrade to 1.1.0a OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

SSL_peek() hang on empty record (CVE-2016-6305)

Severity: Moderate

OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an empty record. This could be exploited by a malicious peer in a Denial Of Service attack.

OpenSSL 1.1.0 users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The fix was developed by Matt Caswell of the OpenSSL development team.

SWEET32 Mitigation (CVE-2016-2183)

Severity: Low

SWEET32 (https://sweet32.info) is an attack on older block cipher algorithms that use a block size of 64 bits. In mitigation for the SWEET32 attack DES based ciphersuites have been moved from the HIGH cipherstring group to MEDIUM in OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had these ciphersuites disabled by default.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 16th August 2016 by Karthikeyan Bhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the OpenSSL development team.

OOB write in MDC2_Update() (CVE-2016-6303)

Severity: Low

An overflow can occur in MDC2_Update() either if called directly or through the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption.

The amount of data needed is comparable to SIZE_MAX which is impractical on most platforms.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Malformed SHA512 ticket DoS (CVE-2016-6302)

Severity: Low

If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a DoS attack where a malformed ticket will result in an OOB read which will ultimately crash.

The use of SHA512 in TLS session tickets is comparatively rare as it requires a custom server callback and ticket lookup mechanism.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB write in BN_bn2dec() (CVE-2016-2182)

Severity: Low

The function BN_bn2dec() does not check the return value of BN_div_word(). This can cause an OOB write if an application uses this function with an overly large BIGNUM. This could be a problem if an overly large certificate or CRL is printed out from an untrusted source. TLS is not affected because record limits will reject an oversized certificate before it is parsed.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB read in TS_OBJ_print_bio() (CVE-2016-2180)

Severity: Low

The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is the total length the OID text representation would use and not the amount of data written. This will result in OOB reads when large OIDs are presented.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Pointer arithmetic undefined behaviour (CVE-2016-2177)

Severity: Low

Avoid some undefined pointer arithmetic

A common idiom in the codebase is to check limits in the following manner: "p + len > limit"

Where "p" points to some malloc'd data of SIZE bytes and limit == p + SIZE

"len" here could be from some externally supplied data (e.g. from a TLS message).

The rules of C pointer arithmetic are such that "p + len" is only well defined where len <= SIZE. Therefore the above idiom is actually undefined behaviour.

For example this could cause problems if some malloc implementation provides an address for "p" such that "p + len" actually overflows for values of len that are too big and therefore p + len < limit.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team.

Constant time flag not preserved in DSA signing (CVE-2016-2178)

Severity: Low

Operations in the DSA signing algorithm should run in constant time in order to avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that a non-constant time codepath is followed for certain operations. This has been demonstrated through a cache-timing attack to be sufficient for an attacker to recover the private DSA key.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by César Pereida.

DTLS buffered message DoS (CVE-2016-2179)

Severity: Low

In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed. An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simulataneous connections an attacker could cause a DoS attack through memory exhaustion.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was developed by Matt Caswell of the OpenSSL development team.

DTLS replay protection DoS (CVE-2016-2181)

Severity: Low

A flaw in the DTLS replay attack protection mechanism means that records that arrive for future epochs update the replay protection "window" before the MAC for the record has been validated. This could be exploited by an attacker by sending a record for the next epoch (which does not have to decrypt or have a valid MAC), with a very large sequence number. This means that all subsequent legitimate packets are dropped causing a denial of service for a specific DTLS connection.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. The fix was developed by Matt Caswell of the OpenSSL development team.

Certificate message OOB reads (CVE-2016-6306)

Severity: Low

In OpenSSL 1.0.2 and earlier some missing message length checks can result in OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical DoS risk but this has not been observed in practice on common platforms.

The messages affected are client certificate, client certificate request and server certificate. As a result the attack can only be performed against a client or a server which enables client authentication.

OpenSSL 1.1.0 is not affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)

Severity: Low

A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect DTLS users.

OpenSSL 1.1.0 TLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)

Severity: Low

This issue is very similar to CVE-2016-6307. The underlying defect is different but the security analysis and impacts are the same except that it impacts DTLS.

A DTLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect TLS users.

OpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade.

Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv/20160922.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html . This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.

This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References. (CVE-2016-6304)

  • It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. (CVE-2016-0736)

  • It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. (CVE-2016-8610)

  • It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)

  • A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash. After installing the updated packages, the httpd daemon will be restarted automatically. Bugs fixed (https://bugzilla.redhat.com/):

1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth 1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS 1401528 - CVE-2016-8740 httpd: Incomplete handling of LimitRequestFields directive in mod_http2 1406744 - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto 1406753 - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest 1406822 - CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects 1412120 - CVE-2016-7056 openssl: ECDSA P-256 timing attack key recovery

  1. JIRA issues fixed (https://issues.jboss.org/):

JBCS-319 - Errata for httpd 2.4.23 SP1 RHEL 7

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2016:1940-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1940.html Issue date: 2016-09-27 CVE Names: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 =====================================================================

  1. Summary:

An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. (CVE-2016-2178)

  • It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181)

  • An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. (CVE-2016-2182)

  • A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)

This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.

  • An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. (CVE-2016-6302)

  • Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)

  • An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() 1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-1.0.1e-48.el6_8.3.ppc.rpm openssl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-1.0.1e-48.el6_8.3.s390.rpm openssl-1.0.1e-48.el6_8.3.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-devel-1.0.1e-48.el6_8.3.s390.rpm openssl-devel-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-static-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-perl-1.0.1e-48.el6_8.3.s390x.rpm openssl-static-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

ppc64: openssl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-1.0.1e-51.el7_2.7.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-devel-1.0.1e-51.el7_2.7.s390.rpm openssl-devel-1.0.1e-51.el7_2.7.s390x.rpm openssl-libs-1.0.1e-51.el7_2.7.s390.rpm openssl-libs-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-static-1.0.1e-51.el7_2.7.ppc.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-perl-1.0.1e-51.el7_2.7.s390x.rpm openssl-static-1.0.1e-51.el7_2.7.s390.rpm openssl-static-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-2179 https://access.redhat.com/security/cve/CVE-2016-2180 https://access.redhat.com/security/cve/CVE-2016-2181 https://access.redhat.com/security/cve/CVE-2016-2182 https://access.redhat.com/security/cve/CVE-2016-6302 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-6306 https://access.redhat.com/security/updates/classification/#important https://www.openssl.org/news/secadv/20160922.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI xpTW7ApBLmKhVjs49DGYouI= =4VgY -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .


Gentoo Linux Security Advisory GLSA 201612-16


                                       https://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 07, 2016 Bugs: #581234, #585142, #585276, #591454, #592068, #592074, #592082, #594500, #595186 ID: 201612-16


Synopsis

Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.2j >= 1.0.2j

Description

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers and the International Association for Cryptologic Research's (IACR) paper, "Make Sure DSA Signing Exponentiations Really are Constant-Time" for further details.

Workaround

There is no known workaround at this time.

Resolution

All OpenSSL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2j"

References

[ 1 ] CVE-2016-2105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105 [ 2 ] CVE-2016-2106 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106 [ 3 ] CVE-2016-2107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107 [ 4 ] CVE-2016-2108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108 [ 5 ] CVE-2016-2109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109 [ 6 ] CVE-2016-2176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176 [ 7 ] CVE-2016-2177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177 [ 8 ] CVE-2016-2178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178 [ 9 ] CVE-2016-2180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180 [ 10 ] CVE-2016-2183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183 [ 11 ] CVE-2016-6304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304 [ 12 ] CVE-2016-6305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305 [ 13 ] CVE-2016-6306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306 [ 14 ] CVE-2016-7052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052 [ 15 ] Make Sure DSA Signing Exponentiations Really are Constant-Time http://eprint.iacr.org/2016/594.pdf

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201612-16

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

.

Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. The updates are documented in the Release Notes document linked to in the References. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)

  • A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. Solution:

Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).

The References section of this erratum contains a download link (you must log in to download the update). ========================================================================== Ubuntu Security Notice USN-3087-2 September 23, 2016

openssl regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

USN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was incomplete and caused a regression when parsing certificates. This update fixes the problem.

We apologize for the inconvenience. This issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178) Quan Luo discovered that OpenSSL did not properly restrict the lifetime of queue entries in the DTLS implementation. (CVE-2016-2181) Shi Lei discovered that OpenSSL incorrectly validated division results. (CVE-2016-2182) Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks. (CVE-2016-2183) Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303) Shi Lei discovered that OpenSSL incorrectly performed certain message length checks. (CVE-2016-6306)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.5

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.21

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.38

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0593",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "0.12.0",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "0.10.47",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.1.0",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "0.10.0",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "6.0.0",
         },
         {
            model: "suse linux enterprise module for web scripting",
            scope: "eq",
            trust: 1,
            vendor: "novell",
            version: "12.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1p",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "6.7.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "4.6.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2d",
         },
         {
            model: "node.js",
            scope: "lt",
            trust: 1,
            vendor: "nodejs",
            version: "0.12.16",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "node.js",
            scope: "gte",
            trust: 1,
            vendor: "nodejs",
            version: "4.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.1.0",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.4",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "enterpriseidentitymanager",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard v8.2 to  v9.4",
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.2",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v8.5",
         },
         {
            model: "ucosminexus application server",
            scope: "eq",
            trust: 0.8,
            vendor: "hitachi",
            version: "none",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "sg3600 all series",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2i",
         },
         {
            model: "linux enterprise module for web scripting",
            scope: null,
            trust: 0.8,
            vendor: "suse",
            version: null,
         },
         {
            model: "ucosminexus primary server",
            scope: "eq",
            trust: 0.8,
            vendor: "hitachi",
            version: "base",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.4",
         },
         {
            model: "ucosminexus service platform",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.0 to  v8.1",
         },
         {
            model: "ix1000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "cosminexus http server",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "ucosminexus application server",
            scope: "eq",
            trust: 0.8,
            vendor: "hitachi",
            version: "-r",
         },
         {
            model: "esmpro/serveragentservice",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "all versions  (linux edition )",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "node.js",
            scope: null,
            trust: 0.8,
            vendor: "node js",
            version: null,
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.1.0a",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.10",
         },
         {
            model: "webex centers t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "fujitsu m10-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2280",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13150-13",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.34",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.2.0",
         },
         {
            model: "clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "fujitsu m10-4 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2271",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.22",
         },
         {
            model: "nexus series blade switches 4.1 e1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69010",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "ucs central software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance media server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.3",
         },
         {
            model: "stealthwatch management console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment 5.1.fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.16",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.2",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "project openssl 1.0.2g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "jabber software development kit",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified workforce optimization",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "industrial router 1.2.1rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "910",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "communications session border controller scz7.4.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.8",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3400",
         },
         {
            model: "nexus series switches standalone nx-os mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.29",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3.1",
         },
         {
            model: "nexus series switches standalone nx-os mode 7.0 i5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.11",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.10",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.20",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.4",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.0.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.3",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.23",
         },
         {
            model: "prime license manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
         {
            model: "stealthwatch flowcollector sflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3394",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.6",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "visual quality experience server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.20",
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.9",
         },
         {
            model: "agent for openflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.4",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.8",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154540",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.3",
         },
         {
            model: "telepresence sx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime collaboration assurance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.21",
         },
         {
            model: "asa next-generation firewall services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.6",
         },
         {
            model: "email security appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.0.1",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8200",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.12",
         },
         {
            model: "unified communications manager im & presence service (formerly c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.3",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "identifi wireless",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "10.11",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.5",
         },
         {
            model: "webex meetings for blackberry",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.24",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.22",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.20",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.12",
         },
         {
            model: "fujitsu m12-2 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3000",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.2",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.1.3",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x4.0.7",
         },
         {
            model: "common services platform collector",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.11",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "partner support service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "media services interface",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud web security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime collaboration assurance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "email gateway 7.6.2h968406",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "common services platform collector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.6.2",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "spectrum control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.8",
         },
         {
            model: "webex meetings client on-premises",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "project openssl 1.0.1s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified intelligence center",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6(1)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.12",
         },
         {
            model: "services provisioning platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nac appliance clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "ucs b-series blade servers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1.3",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asa next-generation firewall services",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.2",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.14",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.405",
         },
         {
            model: "communications session border controller scz7.3.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "api gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.2.4.0",
         },
         {
            model: "unified attendant console premium edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "services provisioning platform sfp1.1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "mediasense",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.5",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "jabber for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3.4",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30002.9",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.1.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.1.4",
         },
         {
            model: "project openssl 1.0.1r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3.8",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "fujitsu m12-2s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.10",
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "stealthwatch identity",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.44",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.1.0",
         },
         {
            model: "application policy infrastructure controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.30",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "jboss web server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.26",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.19",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.4",
         },
         {
            model: "show and share",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified workforce optimization quality management solution 11.5 su1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence system ex series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "universal small cell iuh",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.5",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.24",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "ucs director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "infinity",
            scope: "ne",
            trust: 0.3,
            vendor: "pexip",
            version: "13",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.16",
         },
         {
            model: "jabber client framework components",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "webex meetings client on-premises t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "dcm series d9900 digital content manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.4",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70006.2.19",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.6",
         },
         {
            model: "unified attendant console business edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.3",
         },
         {
            model: "project openssl 1.0.2i",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.4",
         },
         {
            model: "bigfix remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "mds series multilayer switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "prime network services controller 1.01u",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.12",
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.9.15.9.8",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.0.10",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "nexus series switches 5.2 sv3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v",
         },
         {
            model: "telepresence system tx1310",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications domain manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m10-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.34",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3103204.4",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.08",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.10",
         },
         {
            model: "project openssl 1.0.2h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise content delivery system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.11",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m10-4s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2271",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.1",
         },
         {
            model: "telepresence system ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.1.0",
         },
         {
            model: "webex business suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dx series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.5(3)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.6.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.1.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.18",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.19",
         },
         {
            model: "fujitsu m12-2 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "nexus series blade switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.17",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.18",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-376.1",
         },
         {
            model: "jabber for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "telepresence profile series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.14",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.1.0.0",
         },
         {
            model: "purview appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.3",
         },
         {
            model: "ace30 application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.28",
         },
         {
            model: "edge digital media player 1.6rb5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "300",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69450",
         },
         {
            model: "telepresence isdn gateway mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.10",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.43",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.6.1.0",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "wireless lan controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.18",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.5.0",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "unified contact center enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.404",
         },
         {
            model: "telepresence system tx1310",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.151.05",
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.0",
         },
         {
            model: "telepresence mx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.16",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0(1)",
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.4",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.26",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.14",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.3.0.179",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.35",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.11",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.5.12.23",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "connected grid routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0.1",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.1.1049",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.36",
         },
         {
            model: "openssh for gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.4",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.401",
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.8",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "bigfix remote control",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "unity express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m10-4s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "project openssl 1.0.2f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.22",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.30",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.9",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.19",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.10",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "macos",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "10.12.1",
         },
         {
            model: "tandberg codian isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway 7.6.405h1165239",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "jabber guest",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.9",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.6",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.9.0",
         },
         {
            model: "digital media manager 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.4.0",
         },
         {
            model: "identifi wireless",
            scope: "ne",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "10.21",
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1901.3",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "asr series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500021.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.2.2",
         },
         {
            model: "project openssl 1.0.1t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.15",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1545410.7",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.12",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.23",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.24",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.12",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.3",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.4",
         },
         {
            model: "fujitsu m10-4 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.27",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.2",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.0",
         },
         {
            model: "webex meetings server multimedia platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "unified ip conference phone 10.3.1sr4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3.5",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.3.0.179",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.2.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.20",
         },
         {
            model: "project openssl 1.0.2d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "series stackable managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "prime access registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "stealthwatch flowcollector netflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.14",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.6",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.3.0",
         },
         {
            model: "ucs manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "network analysis module",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console department edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.26",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.8",
         },
         {
            model: "ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "78000",
         },
         {
            model: "aironet series access points",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "27000",
         },
         {
            model: "onepk all-in-one virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "fujitsu m10-4 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.6.0.1",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0",
         },
         {
            model: "industrial router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9100",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "unified intelligence center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "13006.1",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.7.0.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.7.1",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.116",
         },
         {
            model: "cloupia unified infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11006.1",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "packaged contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.31",
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.8",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "telepresence sx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.19",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5",
         },
         {
            model: "project openssl 1.0.1n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nac appliance clean access server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "project openssl 1.0.1o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "fujitsu m10-4 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2280",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "webex meetings for windows phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.27",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m12-2s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.1",
         },
         {
            model: "prime optical for service providers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.10",
         },
         {
            model: "smart care",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.6.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.16",
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.11",
         },
         {
            model: "edge digital media player 1.2rb1.0.3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "340",
         },
         {
            model: "network performance analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.8",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2.19",
         },
         {
            model: "unified ip conference phone for third-party call control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "fujitsu m12-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "project openssl 1.0.2e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sonas",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.14",
         },
         {
            model: "webex meetings for windows phone",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "82.8",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.0",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl 1.0.1q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "spectrum control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.10",
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.7",
         },
         {
            model: "fujitsu m10-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2271",
         },
         {
            model: "telepresence integrator c series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment intirim fix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.133",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.9",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "webex meetings client hosted",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.8",
         },
         {
            model: "content security management appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.140",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.8",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "stealthwatch udp director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "intrusion prevention system solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.18",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.36",
         },
         {
            model: "fujitsu m12-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.4",
         },
         {
            model: "jabber client framework components",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime ip express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified sip proxy software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.4",
         },
         {
            model: "communications session border controller scz7.2.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "netflow generation appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for mac",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.403",
         },
         {
            model: "unified sip proxy software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "purview appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.4.7895",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.20",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.3",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "5.0",
         },
         {
            model: "telepresence server and mse",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "701087104.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.10",
         },
         {
            model: "ucs series and series fabric interconnects",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "620063000",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "webex meeting center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "communications eagle lnp application processor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.24",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.6.0.0",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.0",
         },
         {
            model: "purview appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.1",
         },
         {
            model: "netflow generation appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(1)",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.13",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.11",
         },
         {
            model: "socialminer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.4",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.3-6513",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.34",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.2.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "intracer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "40002.9",
         },
         {
            model: "purview appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.18",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.07",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.3",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.8.15.7.15",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.26",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.4",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.3.0",
         },
         {
            model: "prime infrastructure",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "6.3",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9.1",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "jboss core services on rhel server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "70",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.23",
         },
         {
            model: "computer telephony integration object server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.18",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3103200",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.1",
         },
         {
            model: "content security appliance update servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "videoscape anyres live",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.7.2",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.6.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.6",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "4.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.32",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.3",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.2",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.1.9",
         },
         {
            model: "macos",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "10.12.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "universal small cell iuh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1.1",
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.4",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-326.1",
         },
         {
            model: "unity express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtualization experience media edition",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1.8",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.15",
         },
         {
            model: "small business series managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.35",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.1",
         },
         {
            model: "fujitsu m12-2s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3000",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10006.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.0",
         },
         {
            model: "telepresence isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.30",
         },
         {
            model: "telepresence mcu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "series smart plus switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2200",
         },
         {
            model: "fujitsu m12-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3000",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.21",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.4",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v0",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "5.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.34",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.4.1102",
         },
         {
            model: "virtual security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.32",
         },
         {
            model: "access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.4.3.0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0",
         },
         {
            model: "fujitsu m10-4s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.38",
         },
         {
            model: "telepresence tx9000 series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.35",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "netsight appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.21",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.22",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.12",
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.4",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.2.0",
         },
         {
            model: "telepresence system series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30006.1",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.4",
         },
         {
            model: "security manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.13",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.0",
         },
         {
            model: "ucs b-series blade servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "identifi wireless",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "10.11.1",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.3.7856",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.12",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spectrum control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.9",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.5",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "fujitsu m10-4s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.6.0.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "enterprise content delivery system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.9",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "7",
         },
         {
            model: "mds series multilayer switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "-3.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.1",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "4",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence tx9000 series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4.2.0",
         },
         {
            model: "prime performance manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tealeaf customer experience on cloud network capture add-on",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "16.1.01",
         },
         {
            model: "smart net total care local collector appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.12",
         },
         {
            model: "project openssl 1.1.0a",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.8.9",
         },
         {
            model: "network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "fujitsu m10-4 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "prime performance manager sp1611",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.7",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.12",
         },
         {
            model: "fujitsu m10-4s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2280",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.22",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1.6.0",
         },
         {
            model: "unified ip phone 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6901",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.16",
         },
         {
            model: "telepresence server and mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "701087100",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.2",
         },
         {
            model: "jboss core services on rhel server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "60",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.10",
         },
         {
            model: "mds series multilayer switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "90006.2.19",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270015.5(3)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.18",
         },
         {
            model: "spectrum control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.11",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.3.0.1098",
         },
         {
            model: "webex meetings for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "5.0",
         },
         {
            model: "digital media manager 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unified workforce optimization quality management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "telepresence integrator c series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.3",
         },
         {
            model: "sparc enterprise m9000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "cloud object storage",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.2",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.14",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.4",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.4",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "purview appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.6",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.10",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.4",
         },
         {
            model: "application and content networking system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.7.0",
         },
         {
            model: "ace application control engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "47100",
         },
         {
            model: "oss support tools",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "8.15.17.3.14",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "x0",
         },
         {
            model: "fujitsu m12-2s server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.2.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime infrastructure plug and play standalone gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.2",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "virtual security gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.6",
         },
         {
            model: "nac appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.6",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.2.19",
         },
         {
            model: "project openssl 1.0.1u",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.14",
         },
         {
            model: "telepresence conductor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "application policy infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m12-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2320",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.2",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.1",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.0",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "telepresence video communication server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "netsight appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "7.0.6",
         },
         {
            model: "communications eagle lnp application processor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.0.0",
         },
         {
            model: "sparc enterprise m4000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4.1",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "multicast manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "5",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.16",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.4",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.8",
         },
         {
            model: "webex node for mcs",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mcu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1.89)",
         },
         {
            model: "management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.1.2",
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.2",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.003(002)",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8204.4",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.3",
         },
         {
            model: "project openssl 1.0.2c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.4",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.400",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "expressway series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "prime network",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "431",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.28",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.7",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.33",
         },
         {
            model: "unified attendant console enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.14",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fujitsu m10-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.26",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.36",
         },
         {
            model: "network analysis module 6.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence system ex series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "mxe series media experience engines",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "35000",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "extremenetworks",
            version: "5.1",
         },
         {
            model: "project openssl 1.0.2b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "videoscape control suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "ip series phones vpn feature",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800-0",
         },
         {
            model: "sparc enterprise m8000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.3",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.1.42",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.25",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.2.0.0",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "unified meetingplace 8.6mr1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "email gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.406-3402.103",
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70002.9",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "fujitsu m12-2 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2230",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "spa525g 5-line ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.0",
         },
         {
            model: "secure access control system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip conference phone for third-party call control 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "unified ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "fujitsu m10-1 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.6",
         },
         {
            model: "visual quality experience tools server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtualization experience media edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.3.2",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway 7.6.405h1157986",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.7",
         },
         {
            model: "registered envelope service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.2.35",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.3.5",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.5.12.23",
         },
         {
            model: "firesight system software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0.4",
         },
         {
            model: "webex meetings client hosted t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.2",
         },
         {
            model: "unified meetingplace",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "unified contact center express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "6",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "webex meetings server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.1.30",
         },
         {
            model: "sparc enterprise m3000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1118",
         },
         {
            model: "fujitsu m12-2 server xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2290",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sparc enterprise m5000 xcp",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "1117",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.13",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.402",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.10",
         },
         {
            model: "project openssl 1.0.1p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "93150",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:nodejs:node.js",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:suse:linux_enterprise_module_for_web_scripting",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:capssuite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterprise_directoryserver",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterpriseidentitymanager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragent",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragentservice",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix1000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hitachi:cosminexus_http_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hitachi:ucosminexus_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hitachi:ucosminexus_primary_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hitachi:ucosminexus_service_platform",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            db: "PACKETSTORM",
            id: "143873",
         },
      ],
      trust: 0.5,
   },
   cve: "CVE-2016-6304",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2016-6304",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2016-6304",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2016-6304",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2016-6304",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2016-6304",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-6304",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. \nIf that client continually requests renegotiation, sending a large OCSP Status\nRequest extension each time, then there will be unbounded memory growth on the\nserver. Servers with a default configuration are vulnerable even if they do\nnot support OCSP. Builds using the \"no-ocsp\" build time option are not affected. \n\nServers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default\nconfiguration, instead only if an application explicitly enables OCSP stapling\nsupport. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nSSL_peek() hang on empty record (CVE-2016-6305)\n===============================================\n\nSeverity: Moderate\n\nOpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an\nempty record. This could be exploited by a malicious peer in a Denial Of Service\nattack. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nSWEET32 Mitigation (CVE-2016-2183)\n==================================\n\nSeverity: Low\n\nSWEET32 (https://sweet32.info) is an attack on older block cipher algorithms\nthat use a block size of 64 bits. In mitigation for the SWEET32 attack DES based\nciphersuites have been moved from the HIGH cipherstring group to MEDIUM in\nOpenSSL 1.0.1 and OpenSSL 1.0.2.  OpenSSL 1.1.0 since release has had these\nciphersuites disabled by default. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 16th August 2016 by Karthikeyan\nBhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the\nOpenSSL development team. \n\nOOB write in MDC2_Update() (CVE-2016-6303)\n==========================================\n\nSeverity: Low\n\nAn overflow can occur in MDC2_Update() either if called directly or\nthrough the EVP_DigestUpdate() function using MDC2. If an attacker\nis able to supply very large amounts of input data after a previous\ncall to EVP_EncryptUpdate() with a partial block then a length check\ncan overflow resulting in a heap corruption. \n\nThe amount of data needed is comparable to SIZE_MAX which is impractical\non most platforms. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nMalformed SHA512 ticket DoS (CVE-2016-6302)\n===========================================\n\nSeverity: Low\n\nIf a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a\nDoS attack where a malformed ticket will result in an OOB read which will\nultimately crash. \n\nThe use of SHA512 in TLS session tickets is comparatively rare as it requires\na custom server callback and ticket lookup mechanism. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB write in BN_bn2dec() (CVE-2016-2182)\n========================================\n\nSeverity: Low\n\nThe function BN_bn2dec() does not check the return value of BN_div_word(). \nThis can cause an OOB write if an application uses this function with an\noverly large BIGNUM. This could be a problem if an overly large certificate\nor CRL is printed out from an untrusted source. TLS is not affected because\nrecord limits will reject an oversized certificate before it is parsed. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB read in TS_OBJ_print_bio() (CVE-2016-2180)\n==============================================\n\nSeverity: Low\n\nThe function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is\nthe total length the OID text representation would use and not the amount\nof data written. This will result in OOB reads when large OIDs are presented. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nPointer arithmetic undefined behaviour (CVE-2016-2177)\n======================================================\n\nSeverity: Low\n\nAvoid some undefined pointer arithmetic\n\nA common idiom in the codebase is to check limits in the following manner:\n\"p + len > limit\"\n\nWhere \"p\" points to some malloc'd data of SIZE bytes and\nlimit == p + SIZE\n\n\"len\" here could be from some externally supplied data (e.g. from a TLS\nmessage). \n\nThe rules of C pointer arithmetic are such that \"p + len\" is only well\ndefined where len <= SIZE. Therefore the above idiom is actually\nundefined behaviour. \n\nFor example this could cause problems if some malloc implementation\nprovides an address for \"p\" such that \"p + len\" actually overflows for\nvalues of len that are too big and therefore p + len < limit. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nConstant time flag not preserved in DSA signing (CVE-2016-2178)\n===============================================================\n\nSeverity: Low\n\nOperations in the DSA signing algorithm should run in constant time in order to\navoid side channel attacks. A flaw in the OpenSSL DSA implementation means that\na non-constant time codepath is followed for certain operations. This has been\ndemonstrated through a cache-timing attack to be sufficient for an attacker to\nrecover the private DSA key. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto\nUniversity), Billy Brumley (Tampere University of Technology), and Yuval Yarom\n(The University of Adelaide and NICTA). The fix was developed by César Pereida. \n\nDTLS buffered message DoS (CVE-2016-2179)\n=========================================\n\nSeverity: Low\n\nIn a DTLS connection where handshake messages are delivered out-of-order those\nmessages that OpenSSL is not yet ready to process will be buffered for later\nuse. Under certain circumstances, a flaw in the logic means that those messages\ndo not get removed from the buffer even though the handshake has been completed. \nAn attacker could force up to approx. 15 messages to remain in the buffer when\nthey are no longer required. These messages will be cleared when the DTLS\nconnection is closed. The default maximum size for a message is 100k. Therefore\nthe attacker could force an additional 1500k to be consumed per connection. By\nopening many simulataneous connections an attacker could cause a DoS attack\nthrough memory exhaustion. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was\ndeveloped by Matt Caswell of the OpenSSL development team. \n\nDTLS replay protection DoS (CVE-2016-2181)\n==========================================\n\nSeverity: Low\n\nA flaw in the DTLS replay attack protection mechanism means that records that\narrive for future epochs update the replay protection \"window\" before the MAC\nfor the record has been validated. This could be exploited by an attacker by\nsending a record for the next epoch (which does not have to decrypt or have a\nvalid MAC), with a very large sequence number. This means that all subsequent\nlegitimate packets are dropped causing a denial of service for a specific\nDTLS connection. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. \nThe fix was developed by Matt Caswell of the OpenSSL development team. \n\nCertificate message OOB reads (CVE-2016-6306)\n=============================================\n\nSeverity: Low\n\nIn OpenSSL 1.0.2 and earlier some missing message length checks can result in\nOOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical\nDoS risk but this has not been observed in practice on common platforms. \n\nThe messages affected are client certificate, client certificate request and\nserver certificate. As a result the attack can only be performed against\na client or a server which enables client authentication. \n\nOpenSSL 1.1.0 is not affected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in tls_get_message_header() (CVE-2016-6307)\n==========================================================================\n\nSeverity: Low\n\nA TLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect DTLS users. \n\nOpenSSL 1.1.0 TLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)\n=============================================================================\n\nSeverity: Low\n\nThis issue is very similar to CVE-2016-6307. The underlying defect is different\nbut the security analysis and impacts are the same except that it impacts DTLS. \n\nA DTLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect TLS users. \n\nOpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/policies/releasestrat.html), support for OpenSSL\nversion 1.0.1 will cease on 31st December 2016. No security updates for that\nversion will be provided after that date. Users of 1.0.1 are advised to\nupgrade. \n\nSupport for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those\nversions are no longer receiving security updates. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv/20160922.txt\n\nNote: the online version of the advisory may be updated with additional details\nover time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/policies/secpolicy.html\n. This software, such as Apache HTTP Server, is\ncommon to multiple JBoss middleware products, and is packaged under Red Hat\nJBoss Core Services to allow for faster distribution of updates, and for a\nmore consistent update experience. \n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23\nService Pack 1 serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes, which are documented in\nthe Release Notes document linked to in the References. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use\nany mechanisms to verify integrity of the encrypted session data stored in\nthe user's browser. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not\nproperly check for memory allocation failures. \n(CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed\ncertain characters not permitted by the HTTP protocol specification to\nappear unencoded in HTTP request headers. If httpd was used in conjunction\nwith a proxy or backend server that interpreted those characters\ndifferently, a remote attacker could possibly use this flaw to inject data\ninto HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd's handling of the LimitRequestFields\ndirective in mod_http2, affecting servers with HTTP/2 enabled. An attacker\ncould send crafted requests with headers larger than the server's available\nmemory, causing httpd to crash. After installing the updated\npackages, the httpd daemon will be restarted automatically. Bugs fixed (https://bugzilla.redhat.com/):\n\n1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth\n1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS\n1401528 - CVE-2016-8740 httpd: Incomplete handling of LimitRequestFields directive in mod_http2\n1406744 - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto\n1406753 - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest\n1406822 - CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects\n1412120 - CVE-2016-7056 openssl: ECDSA P-256 timing attack key recovery\n\n6. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-319 - Errata for httpd 2.4.23 SP1 RHEL 7\n\n7. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2016:1940-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1940.html\nIssue date:        2016-09-27\nCVE Names:         CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 \n                   CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 \n                   CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 \n=====================================================================\n\n1. Summary:\n\nAn update for openssl is now available for Red Hat Enterprise Linux 6 and\nRed Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and\nTransport Layer Security (TLS) protocols, as well as a full-strength\ngeneral-purpose cryptography library. \n(CVE-2016-2178)\n\n* It was discovered that the Datagram TLS (DTLS) implementation could fail\nto release memory in certain cases. A malicious DTLS client could cause a\nDTLS server using OpenSSL to consume an excessive amount of memory and,\npossibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw\nto make a DTLS server using OpenSSL to reject further packets sent from a\nDTLS client over an established DTLS connection. (CVE-2016-2181)\n\n* An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec()\nfunction. (CVE-2016-2182)\n\n* A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL\nprotocol. A man-in-the-middle attacker could use this flaw to recover some\nplaintext data by capturing large amounts of encrypted traffic between\nTLS/SSL server and client if the communication used a DES/3DES based\nciphersuite. (CVE-2016-2183)\n\nThis update mitigates the CVE-2016-2183 issue by lowering priority of DES\ncipher suites so they are not preferred over cipher suites using AES. For\ncompatibility reasons, DES cipher suites remain enabled by default and\nincluded in the set of cipher suites identified by the HIGH cipher string. \nFuture updates may move them to MEDIUM or not enable them by default. \n\n* An integer underflow flaw leading to a buffer over-read was found in the\nway OpenSSL parsed TLS session tickets. (CVE-2016-6302)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed\npointer arithmetic. A remote attacker could possibly use these flaws to\ncause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\n* An out of bounds read flaw was found in the way OpenSSL formatted Public\nKey Infrastructure Time-Stamp Protocol data for printing. An attacker could\npossibly cause an application using OpenSSL to crash if it printed time\nstamp data from the attacker. A remote attacker could\npossibly use these flaws to crash a TLS/SSL server or client using OpenSSL. \n(CVE-2016-6306)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304\nand CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase\n1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation\n1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio()\n1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()\n1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection\n1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)\n1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer\n1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks\n1377594 - CVE-2016-6306 openssl: certificate message OOB reads\n1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-static-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nppc64:\nopenssl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-2177\nhttps://access.redhat.com/security/cve/CVE-2016-2178\nhttps://access.redhat.com/security/cve/CVE-2016-2179\nhttps://access.redhat.com/security/cve/CVE-2016-2180\nhttps://access.redhat.com/security/cve/CVE-2016-2181\nhttps://access.redhat.com/security/cve/CVE-2016-2182\nhttps://access.redhat.com/security/cve/CVE-2016-6302\nhttps://access.redhat.com/security/cve/CVE-2016-6304\nhttps://access.redhat.com/security/cve/CVE-2016-6306\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://www.openssl.org/news/secadv/20160922.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI\nxpTW7ApBLmKhVjs49DGYouI=\n=4VgY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201612-16\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: December 07, 2016\n     Bugs: #581234, #585142, #585276, #591454, #592068, #592074,\n           #592082, #594500, #595186\n       ID: 201612-16\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, the worst of which\nallows attackers to conduct a time based side-channel attack. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.2j                  >= 1.0.2j\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review\nthe CVE identifiers and the International Association for Cryptologic\nResearch's (IACR) paper, \"Make Sure DSA Signing Exponentiations Really\nare Constant-Time\" for further details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n  # emerge --sync\n   # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.2j\"\n\nReferences\n==========\n\n[  1 ] CVE-2016-2105\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105\n[  2 ] CVE-2016-2106\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106\n[  3 ] CVE-2016-2107\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107\n[  4 ] CVE-2016-2108\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108\n[  5 ] CVE-2016-2109\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109\n[  6 ] CVE-2016-2176\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176\n[  7 ] CVE-2016-2177\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177\n[  8 ] CVE-2016-2178\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178\n[  9 ] CVE-2016-2180\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180\n[ 10 ] CVE-2016-2183\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183\n[ 11 ] CVE-2016-6304\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304\n[ 12 ] CVE-2016-6305\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305\n[ 13 ] CVE-2016-6306\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306\n[ 14 ] CVE-2016-7052\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052\n[ 15 ] Make Sure DSA Signing Exponentiations Really are Constant-Time\n       http://eprint.iacr.org/2016/594.pdf\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201612-16\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. \n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies. The updates are documented in the Release Notes document\nlinked to in the References. If sendfile processing completed quickly, it was\npossible for the Processor to be added to the processor cache twice. This\ncould lead to invalid responses or information disclosure. (CVE-2017-5647)\n\n* A vulnerability was discovered in the error page mechanism in Tomcat's\nDefaultServlet implementation. A crafted HTTP request could cause undesired\nside effects, possibly including the removal or replacement of the custom\nerror page. Solution:\n\nBefore applying the update, back up your existing Red Hat JBoss Web Server\ninstallation (including all applications and configuration files). \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). ==========================================================================\nUbuntu Security Notice USN-3087-2\nSeptember 23, 2016\n\nopenssl regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nUSN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was\nincomplete and caused a regression when parsing certificates. This update\nfixes the problem. \n\nWe apologize for the inconvenience. This\n issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178)\n  Quan Luo discovered that OpenSSL did not properly restrict the lifetime\n of queue entries in the DTLS implementation. (CVE-2016-2181)\n  Shi Lei discovered that OpenSSL incorrectly validated division results. \n (CVE-2016-2182)\n  Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES\n ciphers were vulnerable to birthday attacks. \n (CVE-2016-2183)\n  Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303)\n  Shi Lei discovered that OpenSSL incorrectly performed certain message\n length checks. (CVE-2016-6306)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n  libssl1.0.0                     1.0.2g-1ubuntu4.5\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.21\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.38\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "BID",
            id: "93150",
         },
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            db: "PACKETSTORM",
            id: "140056",
         },
         {
            db: "PACKETSTORM",
            id: "143873",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-6304",
            trust: 3,
         },
         {
            db: "BID",
            id: "93150",
            trust: 1.4,
         },
         {
            db: "MCAFEE",
            id: "SB10171",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10215",
            trust: 1.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.1,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-21",
            trust: 1.1,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-20",
            trust: 1.1,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-16",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1036878",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1037640",
            trust: 1.1,
         },
         {
            db: "PACKETSTORM",
            id: "139091",
            trust: 1.1,
         },
         {
            db: "JUNIPER",
            id: "JSA10759",
            trust: 1.1,
         },
         {
            db: "PULSESECURE",
            id: "SA40312",
            trust: 1.1,
         },
         {
            db: "JVN",
            id: "JVNVU98667810",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-6304",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169633",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "142848",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138870",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "142849",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139769",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140056",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "143873",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138826",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "BID",
            id: "93150",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            db: "PACKETSTORM",
            id: "140056",
         },
         {
            db: "PACKETSTORM",
            id: "143873",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   id: "VAR-201609-0593",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.39592352500000005,
   },
   last_update_date: "2024-11-29T21:37:46.985000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sa-20160927-openssl",
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl",
         },
         {
            title: "hitachi-sec-2017-103",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-103/index.html",
         },
         {
            title: "1995039",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            title: "NV17-001",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv17-001.html",
         },
         {
            title: "OpenSSL 1.1.0 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.1.0-notes.html",
         },
         {
            title: "OpenSSL 1.0.2 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.2-notes.html",
         },
         {
            title: "OpenSSL 1.0.1 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.1-notes.html",
         },
         {
            title: "Security updates for all active release lines, September 2016",
            trust: 0.8,
            url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/",
         },
         {
            title: "Fix OCSP Status Request extension unbounded memory growth",
            trust: 0.8,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137",
         },
         {
            title: "OCSP Status Request extension unbounded memory growth (CVE-2016-6304)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv/20160922.txt",
         },
         {
            title: "SUSE-SU-2016:2470",
            trust: 0.8,
            url: "https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            title: "Oracle Linux Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            title: "Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            title: "SA40312",
            trust: 0.8,
            url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
         },
         {
            title: "SA132",
            trust: 0.8,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            title: "JSA10759",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
         },
         {
            title: "Splunk Enterprise 6.4.5 addresses multiple vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPUE",
         },
         {
            title: "Splunk Enterprise 6.5.1 addresses multiple OpenSSL vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPSV#OpenSSLvulnerabilitiesincludingSWEET32addressedbyversionupgradeto101uand102jSPL129207",
         },
         {
            title: "TNS-2016-16",
            trust: 0.8,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            title: "hitachi-sec-2017-103",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/hitachi-sec-2017-103/index.html",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/09/23/openssl_swats_a_dozen_bugs_one_notable_nasty/",
         },
         {
            title: "Red Hat: Important: openssl security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162802 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171659 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171658 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171414 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171413 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171415 - Security Advisory",
         },
         {
            title: "Amazon Linux AMI: ALAS-2016-749",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-749",
         },
         {
            title: "Red Hat: Important: openssl security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20161940 - Security Advisory",
         },
         {
            title: "Red Hat: CVE-2016-6304",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-6304",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-6304",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 1 security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171801 - Security Advisory",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Web Server Service Pack 1 security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171802 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-2",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-23] openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-23",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-24] lib32-openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-24",
         },
         {
            title: "Debian CVElist Bug Report Logs: Security fixes from the October 2016 CPU",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=712a3573d4790c3bc5a64dddbbf15d5d",
         },
         {
            title: "Forcepoint Security Advisories: CVE-2016-6304 OCSP Status Request Extension Security Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=9b728419f5660d2dfe495a4122ce2f24",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Tenable Security Advisories: [R7] Nessus 6.9 Fixes Multiple Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-16",
         },
         {
            title: "Symantec Security Advisories: SA132 : OpenSSL Vulnerabilities 22-Sep-2016 and 26-Sep-2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=1e6dcaf5dac6ef96a7d917a8c1393040",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160927-openssl",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=ac5af5dd99788925425f5747ec672707",
         },
         {
            title: "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-20",
         },
         {
            title: "Tenable Security Advisories: [R2] LCE 4.8.2 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-21",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6839c4d3fd328571c675c335d58b5591",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=a31bff03e9909229fd67996884614fdf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d",
         },
         {
            title: "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=21c0efa2643d707e2f50a501209eb75c",
         },
         {
            title: "Forcepoint Security Advisories: CVE-2016-2180 to -2183, -6302 to -6309, -2179, -7052 OpenSSL Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=a9dd8a175d084c7432b7ad47715ac50c",
         },
         {
            title: "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=13f3551b67d913fba90df4b2c0dae0bf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4019ca77f50c7a34e4d97833e6f3321e",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "openssl-x509-vulnerabilities",
            trust: 0.1,
            url: "https://github.com/guidovranken/openssl-x509-vulnerabilities ",
         },
         {
            title: "CheckCVE for Probe Manager",
            trust: 0.1,
            url: "https://github.com/treussart/ProbeManager_CheckCVE ",
         },
         {
            title: "hackerone-publicy-disclosed",
            trust: 0.1,
            url: "https://github.com/imhunterand/hackerone-publicy-disclosed ",
         },
         {
            title: "OpenSSL-CVE-lib",
            trust: 0.1,
            url: "https://github.com/chnzzh/OpenSSL-CVE-lib ",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/oracle-fixes-253-vulnerabilities-in-last-cpu-of-2016/121375/",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/openssl-patches-high-severity-ocsp-bug-mitigates-sweet32-attack/120845/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-401",
            trust: 1,
         },
         {
            problemtype: "CWE-399",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.openssl.org/news/secadv/20160922.txt",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
         },
         {
            trust: 1.2,
            url: "https://security.gentoo.org/glsa/201612-16",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2802.html",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/errata/rhsa-2017:2494",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/errata/rhsa-2017:1414",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/errata/rhsa-2017:1413",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2016-1940.html",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-3087-2",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-3087-1",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html",
         },
         {
            trust: 1.1,
            url: "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/93150",
         },
         {
            trust: 1.1,
            url: "http://www.splunk.com/view/sp-caaapue",
         },
         {
            trust: 1.1,
            url: "http://www.splunk.com/view/sp-caaapsv",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10171",
         },
         {
            trust: 1.1,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10759",
         },
         {
            trust: 1.1,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1037640",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1036878",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.1,
            url: "https://www.tenable.com/security/tns-2016-21",
         },
         {
            trust: 1.1,
            url: "https://www.tenable.com/security/tns-2016-20",
         },
         {
            trust: 1.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-16:26.openssl.asc",
         },
         {
            trust: 1.1,
            url: "https://access.redhat.com/errata/rhsa-2017:2493",
         },
         {
            trust: 1.1,
            url: "https://access.redhat.com/errata/rhsa-2017:1802",
         },
         {
            trust: 1.1,
            url: "https://access.redhat.com/errata/rhsa-2017:1801",
         },
         {
            trust: 1.1,
            url: "https://access.redhat.com/errata/rhsa-2017:1658",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2017-1659.html",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2017-1415.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10215",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html",
         },
         {
            trust: 1.1,
            url: "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40312",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2016/dsa-3673",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html",
         },
         {
            trust: 1.1,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2016/oct/62",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2016/dec/47",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2017/jul/31",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html",
         },
         {
            trust: 1.1,
            url: "http://packetstormsecurity.com/files/139091/openssl-x509-parsing-double-free-invalid-free.html",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=2c0d295e26306e15a92eb23a84a1802005c1c137",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6304",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu98667810/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6304",
         },
         {
            trust: 0.8,
            url: "http://www.bizmobile.co.jp/news_02.php?id=4069&nc=1",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6304",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.5,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/cve/cve-2016-6304",
         },
         {
            trust: 0.5,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6306",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2177",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2180",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2178",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160927-openssl",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc",
         },
         {
            trust: 0.3,
            url: "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-openssl-affect-ibm-worklight-and-ibm-mobilefirst-platform-foundation-2/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024394",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1024401",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024648",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021643",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2016-10-07.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991896",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009586",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1009648",
         },
         {
            trust: 0.3,
            url: "https://www-01.ibm.com/support/docview.wss?uid=swg21985392",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992427",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992681",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992898",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993061",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993856",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993875",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21994534",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21994861",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995038",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995129",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995392",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995393",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995691",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995886",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996181",
         },
         {
            trust: 0.3,
            url: "https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2016-009-cve-2016-6304",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2183",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6302",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2182",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2179",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2181",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2016-8610",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8610",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6303",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6305",
         },
         {
            trust: 0.2,
            url: "https://issues.jboss.org/):",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2016-8740",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2016-0736",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8743",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-7056",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2016-8743",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2161",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8740",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2016-7056",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0736",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2016-2161",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/401.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2016:2802",
         },
         {
            trust: 0.1,
            url: "https://github.com/guidovranken/openssl-x509-vulnerabilities",
         },
         {
            trust: 0.1,
            url: "https://github.com/treussart/probemanager_checkcve",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=49001",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/3087-1/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6308",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://sweet32.info)",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6307",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2180",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6306",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2181",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2179",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2182",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6302",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2183",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2176",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-7052",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6304",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6305",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7052",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "http://eprint.iacr.org/2016/594.pdf",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2176",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2180",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6306",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=2.1.2",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-5664",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-5647",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-5647",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/3155411",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-5664",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.21",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.38",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.5",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1626883",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "BID",
            id: "93150",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            db: "PACKETSTORM",
            id: "140056",
         },
         {
            db: "PACKETSTORM",
            id: "143873",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            db: "BID",
            id: "93150",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            db: "PACKETSTORM",
            id: "140056",
         },
         {
            db: "PACKETSTORM",
            id: "143873",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-26T00:00:00",
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            date: "2016-09-23T00:00:00",
            db: "BID",
            id: "93150",
         },
         {
            date: "2016-09-30T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            date: "2016-09-22T12:12:12",
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            date: "2017-06-07T22:47:57",
            db: "PACKETSTORM",
            id: "142848",
         },
         {
            date: "2016-09-27T19:32:00",
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            date: "2017-06-07T22:48:07",
            db: "PACKETSTORM",
            id: "142849",
         },
         {
            date: "2016-11-17T23:52:44",
            db: "PACKETSTORM",
            id: "139769",
         },
         {
            date: "2016-12-07T16:37:31",
            db: "PACKETSTORM",
            id: "140056",
         },
         {
            date: "2017-08-22T05:28:16",
            db: "PACKETSTORM",
            id: "143873",
         },
         {
            date: "2016-09-23T19:19:00",
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            date: "2016-09-26T19:59:00.157000",
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2016-6304",
         },
         {
            date: "2018-04-18T09:00:00",
            db: "BID",
            id: "93150",
         },
         {
            date: "2017-10-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
         {
            date: "2024-11-21T02:55:51.643000",
            db: "NVD",
            id: "CVE-2016-6304",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "93150",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  t1_lib.c Denial of service in Japan  (DoS) Vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004990",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "93150",
         },
      ],
      trust: 0.3,
   },
}

var-201410-1144
Vulnerability from variot

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. Summary:

Updated openssl packages that contain a backported patch to mitigate the CVE-2014-3566 issue and fix two security issues are now available for Red Hat Storage 2.1.

Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:

Red Hat Storage Server 2.1 - x86_64

This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails.

This can prevent a forceful downgrade of the communication to SSL 3.0. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication.

For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123

A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. (CVE-2014-3567)

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Storage Server 2.1:

Source: openssl-1.0.1e-30.el6_6.2.src.rpm

x86_64: openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2014-3513 https://access.redhat.com/security/cve/CVE-2014-3567 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1232123

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

This update adds support for Fallback SCSV to mitigate this issue.

For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u13.

For the unstable distribution (sid), these problems have been fixed in version 1.0.1j-1.

We recommend that you upgrade your openssl packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

============================================================================= FreeBSD-SA-14:23.openssl Security Advisory The FreeBSD Project

Topic: OpenSSL multiple vulnerabilities

Category: contrib Module: openssl Announced: 2014-10-21 Affects: All supported versions of FreeBSD. Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1) 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE) 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE) 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

II. [CVE-2014-3513].

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the integrity of that ticket is first verified. [CVE-2014-3567].

The SSL protocol 3.0, as supported in OpenSSL and other products, supports CBC mode encryption where it could not adequately check the integrity of padding, because of the use of non-deterministic CBC padding. This protocol weakness makes it possible for an attacker to obtain clear text data through a padding-oracle attack.

Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE [CVE-2014-3566].

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade.

When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. [CVE-2014-3568].

III. [CVE-2014-3567].

An active man-in-the-middle attacker can force a protocol downgrade to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data from the connection. [CVE-2014-3566] [CVE-2014-3568]

IV. Workaround

No workaround is available. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc

gpg --verify openssl-10.0.patch.asc

[FreeBSD 9.3]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc

gpg --verify openssl-9.3.patch.asc

[FreeBSD 8.4, 9.1 and 9.2]

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch

fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r273151 releng/8.4/ r273416 stable/9/ r273151 releng/9.1/ r273415 releng/9.2/ r273415 releng/9.3/ r273415 stable/10/ r273149 releng/10.0/ r273415 releng/10.1/ r273399


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIcBAEBAgAGBQJURsSwAAoJEO1n7NZdz2rn3ekQANG9DnAGJq/yAXXtX4wdeP08 Ep35L3dkxJsthoqJhn7fc/pra5SZ5iS7NCRHdh5Xn1dsxRiOsffYt9zanWyTOgj+ RQy9jiNp0oIWQEkxZVoHMIKn6VeQk1I2llSXyERANjeDtKX6GV2gV+Zd4tcExW4T Nn9jVHgkDL/doxJ3C1K0BrkdoEEwyPohAf8WLAg6ZKRm3Pys1Ewjm6fPBPtKUIEu zWFruP5xFz3rM6i/4zcihj7b4BuIKtUBgHf28rgf0I3TKZTr75Xr9h4q/8ZG4H0G Lk/1OoZTiMyjlBLufpTlCOdODjz7ORzDLif47Zyt52iZowq1hl4WO7Xo/C/kPUmG o631wsLmO9tPS2Z0TmIQm1fwjlTvIZefZAlMpa1lDwnwZx2hRsu9TzauACdSbuWx 9i+e8/CSMEsr0qJo8KXjltpV9siULhkvl9xr3PwxMfvHFjGUAuur2zHUoTQZTpy0 nKJJXSs3kIW/4ivLMDuDYijdVnf4hrih6GTKEND6aNXtyXitiFK8J4a/q0T4BBnh 89A2QUFVeeDPmf7jzMh824s8W2uoPFGJqHgdtqv1bLT29rqh5ya/5zi7sci6Q/Mk ov0U8X3Pwun7iwJDeYG6N38lUSdMqImHR12Ay7pOY04i4qau4Yf8B26lwcMk/HrU cZ84y1sCp0qHtTqKuak9 =ywze -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04492722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04492722 Version: 2

HPSBUX03162 SSRT101767 rev.2 - HP-UX Running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, Man-in-the-Middle (MitM) Attack

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-10-28 Last Updated: 2014-11-03

Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, man-in-the-middle (MitM) attack

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), allow unauthorized access, or a man-in-the-middle (MitM) attack.

This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could be exploited remotely to allow disclosure of information.

References:

CVE-2014-3566 Man-in-the-Middle (MitM) attack CVE-2014-3567 Remote Unauthorized Access CVE-2014-3568 Remote Denial of Service (DoS) SSRT101767

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zc

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to resolve these vulnerabilities. The updates are available from the following site.

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I

HP-UX Release HP-UX OpenSSL version

B.11.11 (11i v1) A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot

B.11.23 (11i v2) A.00.09.08zc.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install OpenSSL A.00.09.08zc or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.001 or subsequent

HP-UX B.11.23

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.002 or subsequent

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.003 or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 28 October 2014 Initial release Version:2 (rev.2) - 3 November 2014 Updated download location

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ============================================================================ Ubuntu Security Notice USN-2385-1 October 16, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenSSL. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.7

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.20

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.22

After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001

OS X 10.10.2 and Security Update 2015-001 are now available and address the following:

AFP Server Available for: OS X Mavericks v10.9.5 Impact: A remote attacker may be able to determine all the network addresses of the system Description: The AFP file server supported a command which returned all the network addresses of the system. This issue was addressed by removing the addresses from the result. CVE-ID CVE-2014-4426 : Craig Young of Tripwire VERT

bash Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in bash, including one that may allow local attackers to execute arbitrary code Description: Multiple vulnerabilities existed in bash. These issues were addressed by updating bash to patch level 57. CVE-ID CVE-2014-6277 CVE-2014-7186 CVE-2014-7187

Bluetooth Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer signedness error existed in IOBluetoothFamily which allowed manipulation of kernel memory. This issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems. CVE-ID CVE-2014-4497

Bluetooth Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An error existed in the Bluetooth driver that allowed a malicious application to control the size of a write to kernel memory. The issue was addressed through additional input validation. CVE-ID CVE-2014-8836 : Ian Beer of Google Project Zero

Bluetooth Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple security issues existed in the Bluetooth driver, allowing a malicious application to execute arbitrary code with system privilege. The issues were addressed through additional input validation. CVE-ID CVE-2014-8837 : Roberto Paleari and Aristide Fattori of Emaze Networks

CFNetwork Cache Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Website cache may not be fully cleared after leaving private browsing Description: A privacy issue existed where browsing data could remain in the cache after leaving private browsing. This issue was addressed through a change in caching behavior. CVE-ID CVE-2014-4460

CoreGraphics Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the iSIGHT Partners GVP Program

CPU Software Available for: OS X Yosemite v10.10 and v10.10.1, for: MacBook Pro Retina, MacBook Air (Mid 2013 and later), iMac (Late 2013 and later), Mac Pro (Late 2013) Impact: A malicious Thunderbolt device may be able to affect firmware flashing Description: Thunderbolt devices could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates. CVE-ID CVE-2014-4498 : Trammell Hudson of Two Sigma Investments

CommerceKit Framework Available for: OS X Yosemite v10.10 and v10.10.1 Impact: An attacker with access to a system may be able to recover Apple ID credentials Description: An issue existed in the handling of App Store logs. The App Store process could log Apple ID credentials in the log when additional logging was enabled. This issue was addressed by disallowing logging of credentials. CVE-ID CVE-2014-4499 : Sten Petersen

CoreGraphics Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Some third-party applications with non-secure text entry and mouse events may log those events Description: Due to the combination of an uninitialized variable and an application's custom allocator, non-secure text entry and mouse events may have been logged. This issue was addressed by ensuring that logging is off by default. This issue did not affect systems prior to OS X Yosemite. CVE-ID CVE-2014-1595 : Steven Michaud of Mozilla working with Kent Howard

CoreGraphics Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of PDF files. The issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems. CVE-ID CVE-2014-8816 : Mike Myers, of Digital Operatives LLC

CoreSymbolication Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple type confusion issues existed in coresymbolicationd's handling of XPC messages. These issues were addressed through improved type checking. CVE-ID CVE-2014-8817 : Ian Beer of Google Project Zero

FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Processing a maliciously crafted .dfont file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .dfont files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative

FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4483 : Apple

Foundation Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Viewing a maliciously crafted XML file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the XML parser. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4485 : Apple

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in Intel graphics driver Description: Multiple vulnerabilities existed in the Intel graphics driver, the most serious of which may have led to arbitrary code execution with system privileges. This update addresses the issues through additional bounds checks. CVE-ID CVE-2014-8819 : Ian Beer of Google Project Zero CVE-2014-8820 : Ian Beer of Google Project Zero CVE-2014-8821 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOAcceleratorFamily's handling of certain IOService userclient types. This issue was addressed through improved validation of IOAcceleratorFamily contexts. CVE-ID CVE-2014-4486 : Ian Beer of Google Project Zero

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in IOHIDFamily. This issue was addressed with improved bounds checking. CVE-ID CVE-2014-4487 : TaiG Jailbreak Team

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in IOHIDFamily's handling of resource queue metadata. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4488 : Apple

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOHIDFamily's handling of event queues. This issue was addressed through improved validation of IOHIDFamily event queue initialization. CVE-ID CVE-2014-4489 : @beist

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: A bounds checking issue existed in a user client vended by the IOHIDFamily driver which allowed a malicious application to overwrite arbitrary portions of the kernel address space. The issue is addressed by removing the vulnerable user client method. CVE-ID CVE-2014-8822 : Vitaliy Toropov working with HP's Zero Day Initiative

IOKit Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero

IOUSBFamily Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A privileged application may be able to read arbitrary data from kernel memory Description: A memory access issue existed in the handling of IOUSB controller user client functions. This issue was addressed through improved argument validation. CVE-ID CVE-2014-8823 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Specifying a custom cache mode allowed writing to kernel read-only shared memory segments. This issue was addressed by not granting write permissions as a side-effect of some custom cache modes. CVE-ID CVE-2014-4495 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-8824 : @PanguTeam

Kernel Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A local attacker can spoof directory service responses to the kernel, elevate privileges, or gain kernel execution Description: Issues existed in identitysvc validation of the directory service resolving process, flag handling, and error handling. This issue was addressed through improved validation. CVE-ID CVE-2014-8825 : Alex Radocea of CrowdStrike

Kernel Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A local user may be able to determine kernel memory layout Description: Multiple uninitialized memory issues existed in the network statistics interface, which led to the disclosure of kernel memory content. This issue was addressed through additional memory initialization. CVE-ID CVE-2014-4371 : Fermin J. Serna of the Google Security Team CVE-2014-4419 : Fermin J. Serna of the Google Security Team CVE-2014-4420 : Fermin J. Serna of the Google Security Team CVE-2014-4421 : Fermin J. Serna of the Google Security Team

Kernel Available for: OS X Mavericks v10.9.5 Impact: A person with a privileged network position may cause a denial of service Description: A race condition issue existed in the handling of IPv6 packets. This issue was addressed through improved lock state checking. CVE-ID CVE-2011-2391

Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Maliciously crafted or compromised applications may be able to determine addresses in the kernel Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them. CVE-ID CVE-2014-4491 : @PanguTeam, Stefan Esser

Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata. CVE-ID CVE-2014-4461 : @PanguTeam

LaunchServices Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious JAR file may bypass Gatekeeper checks Description: An issue existed in the handling of application launches which allowed certain malicious JAR files to bypass Gatekeeper checks. This issue was addressed through improved handling of file type metadata. CVE-ID CVE-2014-8826 : Hernan Ochoa of Amplia Security

libnetcore Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious, sandboxed app can compromise the networkd daemon Description: Multiple type confusion issues existed in networkd's handling of interprocess communication. By sending networkd a maliciously formatted message, it may have been possible to execute arbitrary code as the networkd process. The issue is addressed through additional type checking. CVE-ID CVE-2014-4492 : Ian Beer of Google Project Zero

LoginWindow Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A Mac may not lock immediately upon wake Description: An issue existed in the rendering of the lock screen. This issue was address through improved screen rendering while locked. CVE-ID CVE-2014-8827 : Xavier Bertels of Mono, and multiple OS X seed testers

lukemftp Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Using the command line ftp tool to fetch files from a malicious http server may lead to arbitrary code execution Description: A command injection issue existed in the handling of HTTP redirects. This issue was addressed through improved validation of special characters. CVE-ID CVE-2014-8517

OpenSSL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in OpenSSL 0.9.8za, including one that may allow an attacker to downgrade connections to use weaker cipher-suites in applications using the library Description: Multiple vulnerabilities existed in OpenSSL 0.9.8za. These issues were addressed by updating OpenSSL to version 0.9.8zc. CVE-ID CVE-2014-3566 CVE-2014-3567 CVE-2014-3568

Sandbox Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A design issue existed in the caching of sandbox profiles which allowed sandboxed applications to gain write access to the cache. This issue was addressed by restricting write access to paths containing a "com.apple.sandbox" segment. This issue does not affect OS X Yosemite v10.10 or later. CVE-ID CVE-2014-8828 : Apple

SceneKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application could execute arbitrary code leading to compromise of user information Description: Multiple out of bounds write issues existed in SceneKit. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-8829 : Jose Duart of the Google Security Team

SceneKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Viewing a maliciously crafted Collada file may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in SceneKit's handling of Collada files. Viewing a maliciously crafted Collada file may have led to an unexpected application termination or arbitrary code execution. This issue was addressed through improved validation of accessor elements. CVE-ID CVE-2014-8830 : Jose Duart of Google Security Team

Security Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A downloaded application signed with a revoked Developer ID certificate may pass Gatekeeper checks Description: An issue existed with how cached application certificate information was evaluated. This issue was addressed with cache logic improvements. CVE-ID CVE-2014-8838 : Apple

security_taskgate Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: An app may access keychain items belonging to other apps Description: An access control issue existed in the Keychain. Applications signed with self-signed or Developer ID certificates could access keychain items whose access control lists were based on keychain groups. This issue was addressed by validating the signing identity when granting access to keychain groups. CVE-ID CVE-2014-8831 : Apple

Spotlight Available for: OS X Yosemite v10.10 and v10.10.1 Impact: The sender of an email could determine the IP address of the recipient Description: Spotlight did not check the status of Mail's "Load remote content in messages" setting. This issue was addressed by improving configuration checking. CVE-ID CVE-2014-8839 : John Whitehead of The New York Times, Frode Moe of LastFriday.no

Spotlight Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Spotlight may save unexpected information to an external hard drive Description: An issue existed in Spotlight where memory contents may have been written to external hard drives when indexing. This issue was addressed with better memory management. CVE-ID CVE-2014-8832 : F-Secure

SpotlightIndex Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Spotlight may display results for files not belonging to the user Description: A deserialization issue existed in Spotlight's handling of permission caches. A user performing a Spotlight query may have been shown search results referencing files for which they don't have sufficient privileges to read. This issue was addressed with improved bounds checking. CVE-ID CVE-2014-8833 : David J Peacock, Independent Technology Consultant

sysmond Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: A type confusion vulnerability existed in sysmond that allowed a local application to escalate privileges. The issue was addressed with improved type checking. CVE-ID CVE-2014-8835 : Ian Beer of Google Project Zero

UserAccountUpdater Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Printing-related preference files may contain sensitive information about PDF documents Description: OS X Yosemite v10.10 addressed an issue in the handling of password-protected PDF files created from the Print dialog where passwords may have been included in printing preference files. This update removes such extraneous information that may have been present in printing preference files. CVE-ID CVE-2014-8834 : Apple

Note: OS X Yosemite 10.10.2 includes the security content of Safari 8.0.3. For further details see https://support.apple.com/kb/HT204243

OS X Yosemite 10.10.2 and Security Update 2015-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin)

iQIcBAEBAgAGBQJUx8ufAAoJEBcWfLTuOo7tWecQAIFvaOlK0Ar2vbUaH0TIpO9F N9SbkWmdNHDNUvc3LJOaeVfAFlXPbgHYqXGIC0kZiRL5Kyhy/K2hH29iNoIDqfET D1jPWOaAFhzvohViYl12ne/A7bBs5v+3G6gqmGCDCqGyn5VFdUMmS0/ZJSCUkPQG LqTvj5D4ulYl8I5uA9Ur9jD2j/TkSCOWiSTO5diMlt1WcKb1fn5pl9b0YNweI8UX FcZPrIlVNeaSywuitdxZEcWOhsJYbS6Xw13crS/HNJGEO+5N7keCnCJiN9HW4Pt6 8iNAgkSWX6S8nP6mq3tiKJmvh6Qj88tvSLgotc79+C8djvkwkxr3611sSLRUStI/ qmwDeJS+rvNgFiLbcJjDDH1EC3qBqMb5mIsMtnXKDDMS8mNeJHaQFngK2YacFLuW gzAMZIcEhLpWq46rYHBsPsB1iG1shyxxz1zL+JKNAi1aTtfFrP3aItQBUG5T345V 0oJol8oxzen9KLNYJMvE9CTJlrRr204DoQkmhY2dUP2W1EQoEGw2qzy/zBIq0yFA 0FNVcSXE+T4yCyHRGakK/sccw6lyCP0xS/lgaPlkyHsFT3oalu9yyqNtDCJl/Cns sAa5dw0tlb8/zWQ3fsJna2yrw5xSboA5KWegtrjtjodrz8O1MjRrTPgx8AnLjKzq nggZl3Sa+QhfaHSUqSJI =uAqk -----END PGP SIGNATURE----- .


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 https://www.openssl.org/news/secadv_20141015.txt


Updated Packages:

Mandriva Business Server 1/X86_64: 054c36eb1d59a0556ab17a1627f869d2 mbs1/x86_64/lib64openssl1.0.0-1.0.0o-1.mbs1.x86_64.rpm aaff926dab60e6d5635afde92edd9c91 mbs1/x86_64/lib64openssl-devel-1.0.0o-1.mbs1.x86_64.rpm 27a964cb0697f9a8d0c487db11928cca mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0o-1.mbs1.x86_64.rpm 012ccb3cd7acc23e33666290036d0ec9 mbs1/x86_64/lib64openssl-static-devel-1.0.0o-1.mbs1.x86_64.rpm dba56f5d00437cfb90c7fecaa7dc2e86 mbs1/x86_64/openssl-1.0.0o-1.mbs1.x86_64.rpm 89ba517c11cc244d57ecb98ec4be4140 mbs1/SRPMS/openssl-1.0.0o-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security.

Existing users may upgrade to HP OneView version 1.20 using the Update Appliance feature in HP OneView.

HP OneView version 1.20 is available from the following location:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =Z7550-63180

Note: The upgrade (.bin) or a new install (.ova) is also available:

An HP Passport login is required.

Go to the HP Software Depot site at http://www.software.hp.com and search for HP OneView. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-39


                                        http://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 26, 2014 Bugs: #494816, #519264, #525468 ID: 201412-39


Synopsis

Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in Denial of Service or Man-in-the-Middle attacks.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1j *>= 0.9.8z_p2 >= 1.0.1j

Description

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1j"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p2"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

References

[ 1 ] CVE-2013-6449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449 [ 2 ] CVE-2013-6450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450 [ 3 ] CVE-2014-3505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505 [ 4 ] CVE-2014-3506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506 [ 5 ] CVE-2014-3507 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507 [ 6 ] CVE-2014-3509 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509 [ 7 ] CVE-2014-3510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510 [ 8 ] CVE-2014-3511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511 [ 9 ] CVE-2014-3512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512 [ 10 ] CVE-2014-3513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513 [ 11 ] CVE-2014-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567 [ 12 ] CVE-2014-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568 [ 13 ] CVE-2014-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201412-39.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201410-1144",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "flex system chassis management module",
            scope: null,
            trust: 3.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 1.8,
            vendor: "ibm",
            version: "1.50.1",
         },
         {
            model: "flex system chassis management module 1.1.1",
            scope: null,
            trust: 1.2,
            vendor: "ibm",
            version: null,
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zb",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "bladecenter advanced management module 3.66n",
            scope: "ne",
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter advanced management module 3.66k",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system chassis management module 1.50.0",
            scope: null,
            trust: 0.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "global console manager",
            scope: "ne",
            trust: 0.6,
            vendor: "ibm",
            version: "1.26.1.23978",
         },
         {
            model: "global console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.4.2.15036",
         },
         {
            model: "global console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.20.20.23447",
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.50.0",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "local console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.39.0",
         },
         {
            model: "local console manager",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.27.00",
         },
         {
            model: "local console manager",
            scope: "ne",
            trust: 0.6,
            vendor: "ibm",
            version: "1.2.40.00",
         },
         {
            model: "flex system chassis management module 1.40.1",
            scope: null,
            trust: 0.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet23g-2.06",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "rational software architect realtime edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "bladecenter advanced management module 25r5778",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "q",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1948",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.11",
         },
         {
            model: "k",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.21",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.5",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "flex system chassis management module 1.20.2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "connect:enterprise secure client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.0",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudsystem enterprise software",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.2",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "norman shark scada protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.1",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "j",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl 1.0.1j",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "wb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.2.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.1.0",
         },
         {
            model: "n",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "policycenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "project openssl 1.0.0o",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "pa",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "m210",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "vsr1000",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system ib6131 40gb infiniband switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.40",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5.2",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "119000",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.2",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "x-series xos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "10.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "norman shark network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet21c-2.04",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "norman shark scada protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "megaraid storage manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "15.03.01.00",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8720",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.23",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.4",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.22",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70000",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "r2122",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7900",
         },
         {
            model: "flex system chassis management module 1.40.2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.1",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "netcool/system service monitor fp1 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0-",
         },
         {
            model: "flex system en6131 40gb ethernet switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.1",
         },
         {
            model: "flex system ib6131 40gb infiniband switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4.1110",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.3",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1",
         },
         {
            model: "policycenter",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2.10",
         },
         {
            model: "netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8886",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "office connect ps1810",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "aura communication manager ssp04",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "ex series network switches for ibm products pre 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.0",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "m.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.3",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "connect:enterprise command line client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "79000",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "aspera proxy",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "proxyav",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "aspera mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "cloudsystem foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "h.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.20",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "norman shark scada protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7967",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "aspera drive",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.9",
         },
         {
            model: "content analysis system",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.53",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system chassis management module 1.20.1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security analytics platform",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6.10",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "norman shark scada protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.3.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "12500(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v7)0",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8852",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8750",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "57000",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5.0",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5",
         },
         {
            model: "r",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "norman shark network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.0.1",
         },
         {
            model: "esxi esxi550-20150110",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "kb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.8.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129000",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24d-2.08",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.6",
         },
         {
            model: "i.10",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.2",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.0",
         },
         {
            model: "m.08",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.1",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.8",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-493",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.8",
         },
         {
            model: "ssl visibility 3.8.2f",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.6",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.6",
         },
         {
            model: "rational software architect realtime edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0",
         },
         {
            model: "director",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.16.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-109",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.4",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "vb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1881",
         },
         {
            model: "connect:enterprise secure client",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56001",
         },
         {
            model: "ka",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.2",
         },
         {
            model: "security analytics platform",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1.6",
         },
         {
            model: "office connect pk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v5000-",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet21e-2.05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "norman shark network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.3.2",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "yb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.1",
         },
         {
            model: "flex system chassis management module 1.40.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "bcaaa",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24b-2.07",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "flex system fc3171 8gb san switch and san pass-thru",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.5.03.00",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "aspera ondemand for google cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.8.2.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.21",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.0",
         },
         {
            model: "aura utility services sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.5.2",
         },
         {
            model: "aspera console",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.5.3",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "e",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.20",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7779",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.3",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.2",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.10",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.20",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.11",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aspera faspex",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "msr2000 r0106p18",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "va",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aspera ondemand for softlayer",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.4",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.4",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "aspera ondemand for azure",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5700",
         },
         {
            model: "aspera shares",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0",
         },
         {
            model: "qradar risk manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.46.4.2.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "aspera connect server",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "aspera client",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.20",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "aspera outlook plugin",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.4.2",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "system management homepage 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1.131",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.5",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "ssl visibility",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.7",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.3.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.1",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56003",
         },
         {
            model: "sterling connect:enterprise http option",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "vcenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.2",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "flex system chassis management module 1.20.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.2",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-108",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "packetshaper",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2.10",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4",
         },
         {
            model: "esxi",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "5.5",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1.2",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloudsystem foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3.2",
         },
         {
            model: "ps110",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "aspera point to point",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.33",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "splunk",
            scope: "ne",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.7",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.1.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70000",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "imc uam e0302p07",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v7)0",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.5",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "qradar vulnerability manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.8.1.0",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.1",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "ra",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tuxedo",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.1.0",
         },
         {
            model: "proxysg sgos",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5.6.1",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.1.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "rf manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.9.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.6.0",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "packetshaper s-series",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "11.1",
         },
         {
            model: "h.07",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-495",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2.2",
         },
         {
            model: "office connect pm",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "content analysis system",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1",
         },
         {
            model: "ya",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "switch series r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5900",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3",
         },
         {
            model: "bladecenter t advanced management module 32r0835",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.26.2.1.2",
         },
         {
            model: "bladesystem c-class onboard administrator",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.30",
         },
         {
            model: "cloudsystem enterprise software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.80",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "12500(comware r7328p04",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v7)",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.0.1",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.0",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "w",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "content analysis system software",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.1.1.1",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.1.0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.7.0",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.2",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8730",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "pb",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet13a-2.00",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.56.5.1.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "flex system chassis management module 1.1.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7989",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.10",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8740",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.4",
         },
         {
            model: "cacheflow",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "2.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.7",
         },
         {
            model: "xcode",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "7.0",
         },
         {
            model: "switch series r2111p06",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11900",
         },
         {
            model: "imc uam",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.5",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "packetshaper",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "aspera orchestrator",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.10",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.0",
         },
         {
            model: "sterling connect:enterprise http option",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51300",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "y",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59200",
         },
         {
            model: "u",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.4.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.34",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "flex system chassis management module 2.5.3t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "l",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3500-",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "m220",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56002",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "flex system chassis management module 1.0.0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "imc wsm",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "aspera ondemand for amazon",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "msm",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.36.3.1.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1886",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v3700-",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59000",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "msr2000",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "a",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.1",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8677",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet17a-2.02",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.2",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "systems director common agent for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.1",
         },
         {
            model: "f",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24j-2.10",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aspera enterprise server",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "qradar risk manager mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "proxysg sgos",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "switch series r1005p15",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12900",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "office connect p",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "6.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "aspera orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "0",
         },
         {
            model: "norman shark industrial control system protection",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.0",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "norman shark network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.2.3",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "oneview",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.20",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.10",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "nextscale n1200 enclosure fan power controller fhet24g-2.09",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "manager for sle sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "111.7",
         },
         {
            model: "studio onsite",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "1.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.8",
         },
         {
            model: "cloudsystem foundation",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "office connect pl",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "18100",
         },
         {
            model: "content analysis system",
            scope: "ne",
            trust: 0.3,
            vendor: "bluecoat",
            version: "1.2.3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "reporter's iso",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "9.4",
         },
         {
            model: "splunk",
            scope: "eq",
            trust: 0.3,
            vendor: "splunk",
            version: "5.0.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.05",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "systems insight manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "t",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vsr1000 r0204p01",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3",
         },
         {
            model: "flex system en6131 40gb ethernet switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4.1110",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "switch series r2311p05",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5920",
         },
         {
            model: "aspera point to point",
            scope: "ne",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "systems director common agent for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1",
         },
         {
            model: "xcode",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "ei switch series r3108p03",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "5130",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "128969",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2014-3567",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3567",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3567",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3567",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. Summary:\n\nUpdated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Storage 2.1. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. Relevant releases/architectures:\n\nRed Hat Storage Server 2.1 - x86_64\n\n3. \n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails. \n\nThis can prevent a forceful downgrade of the communication to SSL 3.0. \nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication. \n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Storage Server 2.1:\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-3513\nhttps://access.redhat.com/security/cve/CVE-2014-3567\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1232123\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. This flaw allows a man-in-the-middle (MITM)\n    attacker to decrypt a selected byte of a cipher text in as few as 256\n    tries if they are able to force a victim application to repeatedly send\n    the same data over newly created SSL 3.0 connections. \n\n    This update adds support for Fallback SCSV to mitigate this issue. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1.0.1e-2+deb7u13. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.1j-1. \n\nWe recommend that you upgrade your openssl packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=============================================================================\nFreeBSD-SA-14:23.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          OpenSSL multiple vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2014-10-21\nAffects:        All supported versions of FreeBSD. \nCorrected:      2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1)\n                2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1)\n                2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10)\n                2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE)\n                2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3)\n                2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13)\n                2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20)\n                2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE)\n                2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17)\nCVE Name:       CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nII.  [CVE-2014-3513]. \n\nWhen an OpenSSL SSL/TLS/DTLS server receives a session ticket the\nintegrity of that ticket is first verified.  [CVE-2014-3567]. \n\nThe SSL protocol 3.0, as supported in OpenSSL and other products, supports\nCBC mode encryption where it could not adequately check the integrity of\npadding, because of the use of non-deterministic CBC padding.  This\nprotocol weakness makes it possible for an attacker to obtain clear text\ndata through a padding-oracle attack. \n\nSome client applications (such as browsers) will reconnect using a\ndowngraded protocol to work around interoperability bugs in older\nservers. This could be exploited by an active man-in-the-middle to\ndowngrade connections to SSL 3.0 even if both sides of the connection\nsupport higher protocols. SSL 3.0 contains a number of weaknesses\nincluding POODLE [CVE-2014-3566]. \n\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\nto block the ability for a MITM attacker to force a protocol downgrade. \n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers\ncould accept and complete a SSL 3.0 handshake, and clients could be\nconfigured to send them. [CVE-2014-3568]. \n\nIII. \n[CVE-2014-3567]. \n\nAn active man-in-the-middle attacker can force a protocol downgrade\nto SSLv3 and exploit the weakness of SSLv3 to obtain clear text data\nfrom the connection. [CVE-2014-3566] [CVE-2014-3568]\n\nIV.  Workaround\n\nNo workaround is available.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 8.4, 9.1 and 9.2]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r273151\nreleng/8.4/                                                       r273416\nstable/9/                                                         r273151\nreleng/9.1/                                                       r273415\nreleng/9.2/                                                       r273415\nreleng/9.3/                                                       r273415\nstable/10/                                                        r273149\nreleng/10.0/                                                      r273415\nreleng/10.1/                                                      r273399\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>\n\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>\n\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>\n\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>\n\nThe latest revision of this advisory is available at\n<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-14:23.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIcBAEBAgAGBQJURsSwAAoJEO1n7NZdz2rn3ekQANG9DnAGJq/yAXXtX4wdeP08\nEp35L3dkxJsthoqJhn7fc/pra5SZ5iS7NCRHdh5Xn1dsxRiOsffYt9zanWyTOgj+\nRQy9jiNp0oIWQEkxZVoHMIKn6VeQk1I2llSXyERANjeDtKX6GV2gV+Zd4tcExW4T\nNn9jVHgkDL/doxJ3C1K0BrkdoEEwyPohAf8WLAg6ZKRm3Pys1Ewjm6fPBPtKUIEu\nzWFruP5xFz3rM6i/4zcihj7b4BuIKtUBgHf28rgf0I3TKZTr75Xr9h4q/8ZG4H0G\nLk/1OoZTiMyjlBLufpTlCOdODjz7ORzDLif47Zyt52iZowq1hl4WO7Xo/C/kPUmG\no631wsLmO9tPS2Z0TmIQm1fwjlTvIZefZAlMpa1lDwnwZx2hRsu9TzauACdSbuWx\n9i+e8/CSMEsr0qJo8KXjltpV9siULhkvl9xr3PwxMfvHFjGUAuur2zHUoTQZTpy0\nnKJJXSs3kIW/4ivLMDuDYijdVnf4hrih6GTKEND6aNXtyXitiFK8J4a/q0T4BBnh\n89A2QUFVeeDPmf7jzMh824s8W2uoPFGJqHgdtqv1bLT29rqh5ya/5zi7sci6Q/Mk\nov0U8X3Pwun7iwJDeYG6N38lUSdMqImHR12Ay7pOY04i4qau4Yf8B26lwcMk/HrU\ncZ84y1sCp0qHtTqKuak9\n=ywze\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04492722\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04492722\nVersion: 2\n\nHPSBUX03162 SSRT101767 rev.2 - HP-UX Running OpenSSL, Remote Denial of\nService (DoS), Unauthorized Access, Man-in-the-Middle (MitM) Attack\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-10-28\nLast Updated: 2014-11-03\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized\naccess, man-in-the-middle (MitM) attack\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nOpenSSL. These vulnerabilities could be exploited remotely to create a Denial\nof Service (DoS), allow unauthorized access, or a man-in-the-middle (MitM)\nattack. \n\nThis is the SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"Poodle\", which could be exploited remotely to\nallow disclosure of information. \n\nReferences:\n\nCVE-2014-3566 Man-in-the-Middle (MitM) attack\nCVE-2014-3567 Remote Unauthorized Access\nCVE-2014-3568 Remote Denial of Service (DoS)\nSSRT101767\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zc\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-3566    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-3567    (AV:N/AC:M/Au:N/C:N/I:N/A:C)       7.1\nCVE-2014-3568    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to resolve these vulnerabilities. The\nupdates are available from the following site. \n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot\n\nB.11.23 (11i v2)\n A.00.09.08zc.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08zc or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.001 or subsequent\n\nHP-UX B.11.23\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.002 or subsequent\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.003 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 28 October 2014 Initial release\nVersion:2 (rev.2) - 3 November 2014 Updated download location\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. ============================================================================\nUbuntu Security Notice USN-2385-1\nOctober 16, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \nThis issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.7\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.20\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.22\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001\n\nOS X 10.10.2 and Security Update 2015-001 are now available and\naddress the following:\n\nAFP Server\nAvailable for:  OS X Mavericks v10.9.5\nImpact:  A remote attacker may be able to determine all the network\naddresses of the system\nDescription:  The AFP file server supported a command which returned\nall the network addresses of the system. This issue was addressed by\nremoving the addresses from the result. \nCVE-ID\nCVE-2014-4426 : Craig Young of Tripwire VERT\n\nbash\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  Multiple vulnerabilities in bash, including one that may\nallow local attackers to execute arbitrary code\nDescription:  Multiple vulnerabilities existed in bash. These issues\nwere addressed by updating bash to patch level 57. \nCVE-ID\nCVE-2014-6277\nCVE-2014-7186\nCVE-2014-7187\n\nBluetooth\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer signedness error existed in\nIOBluetoothFamily which allowed manipulation of kernel memory. This\nissue was addressed through improved bounds checking. This issue does\nnot affect OS X Yosemite systems. \nCVE-ID\nCVE-2014-4497\n\nBluetooth\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An error existed in the Bluetooth driver that allowed a\nmalicious application to control the size of a write to kernel\nmemory. The issue was addressed through additional input validation. \nCVE-ID\nCVE-2014-8836 : Ian Beer of Google Project Zero\n\nBluetooth\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple security issues existed in the Bluetooth\ndriver, allowing a malicious application to execute arbitrary code\nwith system privilege. The issues were addressed through additional\ninput validation. \nCVE-ID\nCVE-2014-8837 : Roberto Paleari and Aristide Fattori of Emaze\nNetworks\n\nCFNetwork Cache\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  Website cache may not be fully cleared after leaving private\nbrowsing\nDescription:  A privacy issue existed where browsing data could\nremain in the cache after leaving private browsing. This issue was\naddressed through a change in caching behavior. \nCVE-ID\nCVE-2014-4460\n\nCoreGraphics\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  An integer overflow existed in the handling of PDF\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the\niSIGHT Partners GVP Program\n\nCPU Software\nAvailable for:  OS X Yosemite v10.10 and v10.10.1,\nfor: MacBook Pro Retina, MacBook Air (Mid 2013 and later),\niMac (Late 2013 and later), Mac Pro (Late 2013)\nImpact:  A malicious Thunderbolt device may be able to affect\nfirmware flashing\nDescription:  Thunderbolt devices could modify the host firmware if\nconnected during an EFI update. This issue was addressed by not\nloading option ROMs during updates. \nCVE-ID\nCVE-2014-4498 : Trammell Hudson of Two Sigma Investments\n\nCommerceKit Framework\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  An attacker with access to a system may be able to recover\nApple ID credentials\nDescription:  An issue existed in the handling of App Store logs. The\nApp Store process could log Apple ID credentials in the log when\nadditional logging was enabled. This issue was addressed by\ndisallowing logging of credentials. \nCVE-ID\nCVE-2014-4499 : Sten Petersen\n\nCoreGraphics\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  Some third-party applications with non-secure text entry and\nmouse events may log those events\nDescription:  Due to the combination of an uninitialized variable and\nan application's custom allocator, non-secure text entry and mouse\nevents may have been logged. This issue was addressed by ensuring\nthat logging is off by default. This issue did not affect systems\nprior to OS X Yosemite. \nCVE-ID\nCVE-2014-1595 : Steven Michaud of Mozilla working with Kent Howard\n\nCoreGraphics\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nPDF files. The issue was addressed through improved bounds checking. \nThis issue does not affect OS X Yosemite systems. \nCVE-ID\nCVE-2014-8816 : Mike Myers, of Digital Operatives LLC\n\nCoreSymbolication\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple type confusion issues existed in\ncoresymbolicationd's handling of XPC messages. These issues were\naddressed through improved type checking. \nCVE-ID\nCVE-2014-8817 : Ian Beer of Google Project Zero\n\nFontParser\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Processing a maliciously crafted .dfont file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\n.dfont files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative\n\nFontParser\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the handling of font\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4483 : Apple\n\nFoundation\nAvailable for:  OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Viewing a maliciously crafted XML file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the XML parser. This issue\nwas addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4485 : Apple\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Multiple vulnerabilities in Intel graphics driver\nDescription:  Multiple vulnerabilities existed in the Intel graphics\ndriver, the most serious of which may have led to arbitrary code\nexecution with system privileges. This update addresses the issues\nthrough additional bounds checks. \nCVE-ID\nCVE-2014-8819 : Ian Beer of Google Project Zero\nCVE-2014-8820 : Ian Beer of Google Project Zero\nCVE-2014-8821 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in\nIOAcceleratorFamily's handling of certain IOService userclient types. \nThis issue was addressed through improved validation of\nIOAcceleratorFamily contexts. \nCVE-ID\nCVE-2014-4486 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A buffer overflow existed in IOHIDFamily. This issue\nwas addressed with improved bounds checking. \nCVE-ID\nCVE-2014-4487 : TaiG Jailbreak Team\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in IOHIDFamily's handling of\nresource queue metadata. This issue was addressed through improved\nvalidation of metadata. \nCVE-ID\nCVE-2014-4488 : Apple\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in IOHIDFamily's\nhandling of event queues. This issue was addressed through improved\nvalidation of IOHIDFamily event queue initialization. \nCVE-ID\nCVE-2014-4489 : @beist\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Executing a malicious application may result in arbitrary\ncode execution within the kernel\nDescription:  A bounds checking issue existed in a user client vended\nby the IOHIDFamily driver which allowed a malicious application to\noverwrite arbitrary portions of the kernel address space. The issue\nis addressed by removing the vulnerable user client method. \nCVE-ID\nCVE-2014-8822 : Vitaliy Toropov working with HP's Zero Day Initiative\n\nIOKit\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved validation of\nIOKit API arguments. \nCVE-ID\nCVE-2014-4389 : Ian Beer of Google Project Zero\n\nIOUSBFamily\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A privileged application may be able to read arbitrary data\nfrom kernel memory\nDescription:  A memory access issue existed in the handling of IOUSB\ncontroller user client functions. This issue was addressed through\nimproved argument validation. \nCVE-ID\nCVE-2014-8823 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Specifying a custom cache mode allowed writing to\nkernel read-only shared memory segments. This issue was addressed by\nnot granting write permissions as a side-effect of some custom cache\nmodes. \nCVE-ID\nCVE-2014-4495 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IODataQueue objects. This issue was addressed\nthrough improved validation of metadata. \nCVE-ID\nCVE-2014-8824 : @PanguTeam\n\nKernel\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A local attacker can spoof directory service responses to\nthe kernel, elevate privileges, or gain kernel execution\nDescription:  Issues existed in identitysvc validation of the\ndirectory service resolving process, flag handling, and error\nhandling. This issue was addressed through improved validation. \nCVE-ID\nCVE-2014-8825 : Alex Radocea of CrowdStrike\n\nKernel\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  A local user may be able to determine kernel memory layout\nDescription:  Multiple uninitialized memory issues existed in the\nnetwork statistics interface, which led to the disclosure of kernel\nmemory content. This issue was addressed through additional memory\ninitialization. \nCVE-ID\nCVE-2014-4371 : Fermin J. Serna of the Google Security Team\nCVE-2014-4419 : Fermin J. Serna of the Google Security Team\nCVE-2014-4420 : Fermin J. Serna of the Google Security Team\nCVE-2014-4421 : Fermin J. Serna of the Google Security Team\n\nKernel\nAvailable for:  OS X Mavericks v10.9.5\nImpact:  A person with a privileged network position may cause a\ndenial of service\nDescription:  A race condition issue existed in the handling of IPv6\npackets. This issue was addressed through improved lock state\nchecking. \nCVE-ID\nCVE-2011-2391\n\nKernel\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Maliciously crafted or compromised applications may be able\nto determine addresses in the kernel\nDescription:  An information disclosure issue existed in the handling\nof APIs related to kernel extensions. Responses containing an\nOSBundleMachOHeaders key may have included kernel addresses, which\nmay aid in bypassing address space layout randomization protection. \nThis issue was addressed by unsliding the addresses before returning\nthem. \nCVE-ID\nCVE-2014-4491 : @PanguTeam, Stefan Esser\n\nKernel\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IOSharedDataQueue objects. This issue was\naddressed through relocation of the metadata. \nCVE-ID\nCVE-2014-4461 : @PanguTeam\n\nLaunchServices\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious JAR file may bypass Gatekeeper checks\nDescription:  An issue existed in the handling of application\nlaunches which allowed certain malicious JAR files to bypass\nGatekeeper checks. This issue was addressed through improved handling\nof file type metadata. \nCVE-ID\nCVE-2014-8826 : Hernan Ochoa of Amplia Security\n\nlibnetcore\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious, sandboxed app can compromise the networkd\ndaemon\nDescription:  Multiple type confusion issues existed in networkd's\nhandling of interprocess communication. By sending networkd a\nmaliciously formatted message, it may have been possible to execute\narbitrary code as the networkd process. The issue is addressed\nthrough additional type checking. \nCVE-ID\nCVE-2014-4492 : Ian Beer of Google Project Zero\n\nLoginWindow\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A Mac may not lock immediately upon wake\nDescription:  An issue existed in the rendering of the lock screen. \nThis issue was address through improved screen rendering while\nlocked. \nCVE-ID\nCVE-2014-8827 : Xavier Bertels of Mono, and multiple OS X seed\ntesters\n\nlukemftp\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Using the command line ftp tool to fetch files from a\nmalicious http server may lead to arbitrary code execution\nDescription:  A command injection issue existed in the handling of\nHTTP redirects. This issue was addressed through improved validation\nof special characters. \nCVE-ID\nCVE-2014-8517\n\nOpenSSL\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Multiple vulnerabilities in OpenSSL 0.9.8za, including one\nthat may allow an attacker to downgrade connections to use weaker\ncipher-suites in applications using the library\nDescription:  Multiple vulnerabilities existed in OpenSSL 0.9.8za. \nThese issues were addressed by updating OpenSSL to version 0.9.8zc. \nCVE-ID\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\n\nSandbox\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact:  A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription:  A design issue existed in the caching of sandbox\nprofiles which allowed sandboxed applications to gain write access to\nthe cache. This issue was addressed by restricting write access to\npaths containing a \"com.apple.sandbox\" segment. This issue does\nnot affect OS X Yosemite v10.10 or later. \nCVE-ID\nCVE-2014-8828 : Apple\n\nSceneKit\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact:  A malicious application could execute arbitrary code leading\nto compromise of user information\nDescription:  Multiple out of bounds write issues existed in\nSceneKit. These issues were addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-8829 : Jose Duart of the Google Security Team\n\nSceneKit\nAvailable for:  OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Viewing a maliciously crafted Collada file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A heap buffer overflow existed in SceneKit's handling\nof Collada files. Viewing a maliciously crafted Collada file may have\nled to an unexpected application termination or arbitrary code\nexecution. This issue was addressed through improved validation of\naccessor elements. \nCVE-ID\nCVE-2014-8830 : Jose Duart of Google Security Team\n\nSecurity\nAvailable for:  OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A downloaded application signed with a revoked Developer ID\ncertificate may pass Gatekeeper checks\nDescription:  An issue existed with how cached application\ncertificate information was evaluated. This issue was addressed with\ncache logic improvements. \nCVE-ID\nCVE-2014-8838 : Apple\n\nsecurity_taskgate\nAvailable for:  OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  An app may access keychain items belonging to other apps\nDescription:  An access control issue existed in the Keychain. \nApplications signed with self-signed or Developer ID certificates\ncould access keychain items whose access control lists were based on\nkeychain groups. This issue was addressed by validating the signing\nidentity when granting access to keychain groups. \nCVE-ID\nCVE-2014-8831 : Apple\n\nSpotlight\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  The sender of an email could determine the IP address of the\nrecipient\nDescription:  Spotlight did not check the status of Mail's \"Load\nremote content in messages\" setting. This issue was addressed by\nimproving configuration checking. \nCVE-ID\nCVE-2014-8839 : John Whitehead of The New York Times, Frode Moe of\nLastFriday.no\n\nSpotlight\nAvailable for:  OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  Spotlight may save unexpected information to an external\nhard drive\nDescription:  An issue existed in Spotlight where memory contents may\nhave been written to external hard drives when indexing. This issue\nwas addressed with better memory management. \nCVE-ID\nCVE-2014-8832 : F-Secure\n\nSpotlightIndex\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  Spotlight may display results for files not belonging to the\nuser\nDescription:  A deserialization issue existed in Spotlight's handling\nof permission caches. A user performing a Spotlight query may have\nbeen shown search results referencing files for which they don't have\nsufficient privileges to read. This issue was addressed with improved\nbounds checking. \nCVE-ID\nCVE-2014-8833 : David J Peacock, Independent Technology Consultant\n\nsysmond\nAvailable for:  OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 and v10.10.1\nImpact:  A malicious application may be able to execute arbitrary\ncode with root privileges\nDescription:  A type confusion vulnerability existed in sysmond that\nallowed a local application to escalate privileges. The issue was\naddressed with improved type checking. \nCVE-ID\nCVE-2014-8835 : Ian Beer of Google Project Zero\n\nUserAccountUpdater\nAvailable for:  OS X Yosemite v10.10 and v10.10.1\nImpact:  Printing-related preference files may contain sensitive\ninformation about PDF documents\nDescription:  OS X Yosemite v10.10 addressed an issue in the handling\nof password-protected PDF files created from the Print dialog where\npasswords may have been included in printing preference files. This\nupdate removes such extraneous information that may have been present\nin printing preference files. \nCVE-ID\nCVE-2014-8834 : Apple\n\nNote: OS X Yosemite 10.10.2 includes the security content of Safari\n8.0.3. For further details see https://support.apple.com/kb/HT204243\n\n\nOS X Yosemite 10.10.2 and Security Update 2015-001 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\n\niQIcBAEBAgAGBQJUx8ufAAoJEBcWfLTuOo7tWecQAIFvaOlK0Ar2vbUaH0TIpO9F\nN9SbkWmdNHDNUvc3LJOaeVfAFlXPbgHYqXGIC0kZiRL5Kyhy/K2hH29iNoIDqfET\nD1jPWOaAFhzvohViYl12ne/A7bBs5v+3G6gqmGCDCqGyn5VFdUMmS0/ZJSCUkPQG\nLqTvj5D4ulYl8I5uA9Ur9jD2j/TkSCOWiSTO5diMlt1WcKb1fn5pl9b0YNweI8UX\nFcZPrIlVNeaSywuitdxZEcWOhsJYbS6Xw13crS/HNJGEO+5N7keCnCJiN9HW4Pt6\n8iNAgkSWX6S8nP6mq3tiKJmvh6Qj88tvSLgotc79+C8djvkwkxr3611sSLRUStI/\nqmwDeJS+rvNgFiLbcJjDDH1EC3qBqMb5mIsMtnXKDDMS8mNeJHaQFngK2YacFLuW\ngzAMZIcEhLpWq46rYHBsPsB1iG1shyxxz1zL+JKNAi1aTtfFrP3aItQBUG5T345V\n0oJol8oxzen9KLNYJMvE9CTJlrRr204DoQkmhY2dUP2W1EQoEGw2qzy/zBIq0yFA\n0FNVcSXE+T4yCyHRGakK/sccw6lyCP0xS/lgaPlkyHsFT3oalu9yyqNtDCJl/Cns\nsAa5dw0tlb8/zWQ3fsJna2yrw5xSboA5KWegtrjtjodrz8O1MjRrTPgx8AnLjKzq\nnggZl3Sa+QhfaHSUqSJI\n=uAqk\n-----END PGP SIGNATURE-----\n. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n https://www.openssl.org/news/secadv_20141015.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 054c36eb1d59a0556ab17a1627f869d2  mbs1/x86_64/lib64openssl1.0.0-1.0.0o-1.mbs1.x86_64.rpm\n aaff926dab60e6d5635afde92edd9c91  mbs1/x86_64/lib64openssl-devel-1.0.0o-1.mbs1.x86_64.rpm\n 27a964cb0697f9a8d0c487db11928cca  mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0o-1.mbs1.x86_64.rpm\n 012ccb3cd7acc23e33666290036d0ec9  mbs1/x86_64/lib64openssl-static-devel-1.0.0o-1.mbs1.x86_64.rpm\n dba56f5d00437cfb90c7fecaa7dc2e86  mbs1/x86_64/openssl-1.0.0o-1.mbs1.x86_64.rpm \n 89ba517c11cc244d57ecb98ec4be4140  mbs1/SRPMS/openssl-1.0.0o-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. \n\nExisting users may upgrade to HP OneView version 1.20 using the Update\nAppliance feature in HP OneView. \n\nHP OneView version 1.20 is available from the following location:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=Z7550-63180\n\nNote: The upgrade (.bin) or a new install (.ova) is also available:\n\nAn HP Passport login is required. \n\nGo to the HP Software Depot site at http://www.software.hp.com and search for\nHP OneView. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201412-39\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: December 26, 2014\n     Bugs: #494816, #519264, #525468\n       ID: 201412-39\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, the worst of which\ncould result in Denial of Service or Man-in-the-Middle attacks. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1j              *>= 0.9.8z_p2\n                                                            >= 1.0.1j\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review\nthe CVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1j\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p2\"\n\nPackages which depend on this library may need to be recompiled. Tools\nsuch as revdep-rebuild may assist in identifying these packages. \n\nReferences\n==========\n\n[  1 ] CVE-2013-6449\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449\n[  2 ] CVE-2013-6450\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450\n[  3 ] CVE-2014-3505\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505\n[  4 ] CVE-2014-3506\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506\n[  5 ] CVE-2014-3507\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507\n[  6 ] CVE-2014-3509\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509\n[  7 ] CVE-2014-3510\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510\n[  8 ] CVE-2014-3511\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511\n[  9 ] CVE-2014-3512\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512\n[ 10 ] CVE-2014-3513\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513\n[ 11 ] CVE-2014-3567\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567\n[ 12 ] CVE-2014-3568\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568\n[ 13 ] CVE-2014-5139\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-39.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "PACKETSTORM",
            id: "128793",
         },
         {
            db: "PACKETSTORM",
            id: "128728",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128969",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            db: "PACKETSTORM",
            id: "130132",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            db: "PACKETSTORM",
            id: "128838",
         },
         {
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3567",
            trust: 2.9,
         },
         {
            db: "BID",
            id: "70586",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "62124",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "62030",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61058",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59627",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61819",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61130",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61207",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61837",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61990",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61298",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "62070",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61073",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61959",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1031052",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10091",
            trust: 1.1,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3567",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130815",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "129932",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128838",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130541",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132467",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130132",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132082",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "129721",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132085",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128708",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128969",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128808",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128728",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128793",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            db: "PACKETSTORM",
            id: "128838",
         },
         {
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130132",
         },
         {
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "128969",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128728",
         },
         {
            db: "PACKETSTORM",
            id: "128793",
         },
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   id: "VAR-201410-1144",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.3482142825,
   },
   last_update_date: "2024-11-25T20:42:06.218000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/",
         },
         {
            title: "Red Hat: Critical: rhev-hypervisor6 security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20150126 - Security Advisory",
         },
         {
            title: "Red Hat: CVE-2014-3567",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3567",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2385-1",
         },
         {
            title: "Debian Security Advisories: DSA-3053-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=89bdef3607a7448566a930eca0e94cb3",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-427",
         },
         {
            title: "Symantec Security Advisories: SA87 : OpenSSL Security Advisory 15-Oct-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=374cff59719675d8235f907c21b99bfc",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20141015' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-11",
         },
         {
            title: "IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSH",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b7f5b1e7edcafce07f28205855d4db49",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Splunk Security Announcements: Splunk Enterprise versions 6.0.7 and 5.0.11 address three vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=splunk_security_announcements&qid=555e6256ba536e4a20d40e659e367839",
         },
         {
            title: "Splunk Security Announcements: Splunk Enterprise 6.1.5 addresses two vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=splunk_security_announcements&qid=dfed8c47fbdf5e7bb5fbbdd725bdfb67",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e",
         },
         {
            title: "rhsecapi",
            trust: 0.1,
            url: "https://github.com/RedHatOfficial/rhsecapi ",
         },
         {
            title: "cve-pylib",
            trust: 0.1,
            url: "https://github.com/RedHatProductSecurity/cve-pylib ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1,
         },
         {
            problemtype: "CWE-20",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.5,
            url: "https://www.openssl.org/news/secadv_20141015.txt",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            trust: 1.4,
            url: "http://www.splunk.com/view/sp-caaanst",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.4,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc",
         },
         {
            trust: 1.4,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/70586",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1692.html",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-2385-1",
         },
         {
            trust: 1.2,
            url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
         },
         {
            trust: 1.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:203",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1652.html",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-3053",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61130",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61073",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/62070",
         },
         {
            trust: 1.1,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1031052",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-015.txt.asc",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61207",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/62030",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61819",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61058",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61990",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61837",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/62124",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/ht204244",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0126.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10091",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61959",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61298",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59627",
         },
         {
            trust: 1.1,
            url: "http://advisories.mageia.org/mgasa-2014-0416.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/ht205217",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=7fd4ce6a997be5f5c9e744ac527725c2850de203",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.7,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.5,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21687676",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "https://bto.bluecoat.com/security-advisory/sa87",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690537",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959161",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691210",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/158",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/156",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/157",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/may/159",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/feb/151",
         },
         {
            trust: 0.3,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:23.openssl.asc",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04492722",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692",
         },
         {
            trust: 0.3,
            url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04616259",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/apr/35",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533567 ",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04533567 ",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686792",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196",
         },
         {
            trust: 0.3,
            url: "https://support.asperasoft.com/entries/103000206-security-advisory-cve-2014-3513-cve-2014-3566-poodle-cve-2014-3567-cve-2014-3568",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097074",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21884030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959134",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691005",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21688284",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697995",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697165",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687801",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21689482",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097375",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689101",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700275",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098265",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021548",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097587",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701452",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098251",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098105",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21693662",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689347",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097159",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097913",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21697162",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097867",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097911",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097807",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098586",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689743",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020593",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21691140",
         },
         {
            trust: 0.3,
            url: "http://www.vmware.com/security/advisories/vmsa-2015-0001.html ",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101009000",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700489",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687863",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=ssg1s1005003",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2014-3567",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-6277",
         },
         {
            trust: 0.2,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/20.html",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2015:0126",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2385-1/",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=37192",
         },
         {
            trust: 0.1,
            url: "http://www.software.hp.com",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-7186",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-7169",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-6271",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-7187",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-6278",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-0c9e74c0cd5a48b4a537e63427",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-a7973a3813bf47d8afdb053b58",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-b41f3bc307ee43d39a172d249f",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-0d22e1c193434997889fa62736",
         },
         {
            trust: 0.1,
            url: "https://h20566.www2.hp.com/hpsc/swd/public/detail?switemid=mtx_00eb9ac82e864",
         },
         {
            trust: 0.1,
            url: "https://h20566.www2.hp.com/hpsc/swd/public/detail?switemid=mtx_34bcab41ac7e4",
         },
         {
            trust: 0.1,
            url: "http://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04486577-1",
         },
         {
            trust: 0.1,
            url: "https://technet.microsoft.com/library/security/3009008",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4426",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4485",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4484",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4421",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4483",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4491",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht204243",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2011-2391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4481",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4419",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4420",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4488",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4489",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1595",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4498",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4497",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4460",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4492",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4499",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4389",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4461",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4486",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4495",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4371",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/go/insightupdates",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6450",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6449",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-6450",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5139",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3507",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-6449",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3507",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.22",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:23.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567>",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/1232123",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            db: "PACKETSTORM",
            id: "128838",
         },
         {
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130132",
         },
         {
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "128969",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128728",
         },
         {
            db: "PACKETSTORM",
            id: "128793",
         },
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            db: "BID",
            id: "70586",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            db: "PACKETSTORM",
            id: "128838",
         },
         {
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "130132",
         },
         {
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "128969",
         },
         {
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            db: "PACKETSTORM",
            id: "128728",
         },
         {
            db: "PACKETSTORM",
            id: "128793",
         },
         {
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-10-19T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            date: "2014-10-15T00:00:00",
            db: "BID",
            id: "70586",
         },
         {
            date: "2015-03-13T17:11:00",
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            date: "2015-01-14T03:51:42",
            db: "PACKETSTORM",
            id: "129932",
         },
         {
            date: "2014-10-24T20:07:16",
            db: "PACKETSTORM",
            id: "128838",
         },
         {
            date: "2015-02-26T17:12:16",
            db: "PACKETSTORM",
            id: "130541",
         },
         {
            date: "2015-06-29T15:35:42",
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            date: "2015-01-28T00:36:53",
            db: "PACKETSTORM",
            id: "130132",
         },
         {
            date: "2015-05-29T23:37:23",
            db: "PACKETSTORM",
            id: "132082",
         },
         {
            date: "2014-12-26T15:46:37",
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            date: "2015-05-29T23:37:43",
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            date: "2014-10-17T00:03:35",
            db: "PACKETSTORM",
            id: "128708",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2014-11-04T17:22:00",
            db: "PACKETSTORM",
            id: "128969",
         },
         {
            date: "2014-10-22T19:54:29",
            db: "PACKETSTORM",
            id: "128808",
         },
         {
            date: "2014-10-17T14:50:20",
            db: "PACKETSTORM",
            id: "128728",
         },
         {
            date: "2014-10-22T18:52:41",
            db: "PACKETSTORM",
            id: "128793",
         },
         {
            date: "2014-10-19T01:55:13.933000",
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3567",
         },
         {
            date: "2016-09-09T15:00:00",
            db: "BID",
            id: "70586",
         },
         {
            date: "2024-11-21T02:08:23.750000",
            db: "NVD",
            id: "CVE-2014-3567",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "70586",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL Session Ticket Memory Leak Remote Denial of Service Vulnerability",
      sources: [
         {
            db: "BID",
            id: "70586",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "70586",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0296
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0296",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60993",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60993",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0568",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0568",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-60570",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0568",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0568",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-058",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60570",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "BID",
            id: "60993",
         },
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0568",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "83165",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60993",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60570",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            db: "BID",
            id: "60993",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   id: "VAR-201307-0296",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:45:30.345000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/83165",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0568",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0568",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/83165",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            db: "BID",
            id: "60993",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            db: "BID",
            id: "60993",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60993",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            date: "2013-07-03T13:54:31.063000",
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60570",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60993",
         },
         {
            date: "2013-10-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
         {
            date: "2017-08-29T01:33:06.667000",
            db: "NVD",
            id: "CVE-2013-0568",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003204",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-058",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0292
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0292",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60986",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0558",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2013-0558",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-60560",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0558",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0558",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-055",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60560",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2013-0558",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "BID",
            id: "60986",
         },
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0558",
            trust: 2.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "83006",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC90483",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60986",
            trust: 0.5,
         },
         {
            db: "VULHUB",
            id: "VHN-60560",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            db: "BID",
            id: "60986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   id: "VAR-201307-0292",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T13:01:34.606000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC90483",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC90483",
         },
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic90483",
         },
         {
            trust: 1.2,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/83006",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0558",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0558",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/83006",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.securityfocus.com/bid/60986",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            db: "BID",
            id: "60986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            db: "BID",
            id: "60986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60986",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            date: "2013-07-03T13:54:31.040000",
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60560",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0558",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60986",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
         {
            date: "2017-08-29T01:33:06.357000",
            db: "NVD",
            id: "CVE-2013-0558",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003201",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-055",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0064
Vulnerability from variot

Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker could exploit this vulnerability to read or modify restricted files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0064",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60992",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60992",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-2984",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-2984",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-62986",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-2984",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-2984",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-060",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-62986",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Directory traversal vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to read or modify files via unspecified vectors. \nRemote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. \nExploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. An authorized remote attacker could exploit this vulnerability to read or modify restricted files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "BID",
            id: "60992",
         },
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-2984",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
            trust: 0.7,
         },
         {
            db: "AIXAPAR",
            id: "IC91046",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "84006",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60992",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-62986",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            db: "BID",
            id: "60992",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   id: "VAR-201307-0064",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:52:09.777000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC91046",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC91046",
         },
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-22",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic91046",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/84006",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2984",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2984",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/84006",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            db: "BID",
            id: "60992",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            db: "BID",
            id: "60992",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            date: "2013-06-28T00:00:00",
            db: "BID",
            id: "60992",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            date: "2013-07-03T13:54:31.080000",
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-62986",
         },
         {
            date: "2013-06-28T00:00:00",
            db: "BID",
            id: "60992",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
         {
            date: "2017-08-29T01:33:18.760000",
            db: "NVD",
            id: "CVE-2013-2984",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to directory traversal",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003206",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "path traversal",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-060",
         },
      ],
      trust: 0.6,
   },
}

var-201506-0231
Vulnerability from variot

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. OpenSSL Security Advisory [11 Jun 2015] =======================================

DHE man-in-the-middle protection (Logjam)

A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).

OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n

Fixes for this issue were developed by Emilia Käsper and Kurt Roeckx of the OpenSSL development team.

This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.

This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.

Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

Severity: Moderate

X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.

An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.

PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)

Severity: Moderate

The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.

Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.

CMS verify infinite loop with unknown hash function (CVE-2015-1792)

Severity: Moderate

When verifying a signedData message the CMS code can enter an infinite loop if presented with an unknown hash function OID.

This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Race condition handling NewSessionTicket (CVE-2015-1791)

Severity: Low

If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was discovered by Emilia Käsper of the OpenSSL development team. The fix was developed by Matt Caswell of the OpenSSL development team.

Invalid free in DTLS (CVE-2014-8176)

Severity: Moderate

This vulnerability does not affect current versions of OpenSSL. It existed in previous OpenSSL versions and was fixed in June 2014.

If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.

This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.

The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-02


                                       https://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: June 22, 2015 Bugs: #551832 ID: 201506-02


Synopsis

Multiple vulnerabilities have been found in OpenSSL that can result in either Denial of Service or information disclosure.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o

Description

Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7"

References

[ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201506-02

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. ============================================================================ Ubuntu Security Notice USN-2639-1 June 11, 2015

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. (CVE-2014-8176)

Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. (CVE-2015-1788)

Robert Swiecki and Hanno B=C3=B6ck discovered that OpenSSL incorrectly handled certain ASN1_TIME strings. (CVE-2015-1791)

Johannes Bauer discovered that OpenSSL incorrectly handled verifying signedData messages using the CMS code. (CVE-2015-1792)

As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04: libssl1.0.0 1.0.1f-1ubuntu11.4

Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.8

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.15

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.31

After a standard system update you need to reboot your computer to make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2639-1 CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792

Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4 https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8 https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05184351

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05184351 Version: 1

HPSBHF03613 rev.1 - HPE Network Products including iMC, VCX, and Comware using OpenSSL, Remote Denial of Service (DoS), Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2016-07-05 Last Updated: 2016-07-05

Potential Security Impact: Remote Denial of Service (DoS), Unauthorized Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities in OpenSSL have been addressed with HPE network products including iMC, VCX, Comware 5 and Comware 7. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS) or unauthorized access.

References:

  • CVE-2014-8176 - Remote Denial of Service (DoS)
  • CVE-2015-1788 - Remote Denial of Service (DoS)
  • CVE-2015-1789 - Remote Denial of Service (DoS)
  • CVE-2015-1790 - Remote Denial of Service (DoS)
  • CVE-2015-1791 - Remote Denial of Service (DoS)
  • CVE-2015-1792 - Remote Denial of Service (DoS)
  • CVE-2015-1793 - Remote Unauthorized Access
  • PSRT110158, SSRT102264

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

Please refer to the RESOLUTION below for a list of impacted products.

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2014-8176
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-2015-1788
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2015-1789
  3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2015-1790
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-1791
  5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2015-1792
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2015-1793
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

  https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI

d=emr_na-c01345499

RESOLUTION HPE has released the following software updates to resolve the vulnerabilities in the HP network products including iMC, VCX, Comware 5 and Comware 7.

COMWARE 5 Products

  • A6600 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JC165A HP 6600 RPE-X1 Router Module
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JC566A HP 6600 RSE-X1 Router Main Processing Unit
    • JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
    • JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  • HSR6602 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JC176A HP 6602 Router Chassis
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG355A HP 6600 MCP-X1 Router Main Processing Unit
    • JG356A HP 6600 MCP-X2 Router Main Processing Unit
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
    • JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  • HSR6800 (Comware 5) - Version: R3303P23
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  • MSR20 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD432A HP A-MSR20-21 Router
    • JD662A HP MSR20-20 Router
    • JD663A HP A-MSR20-21 Router
    • JD663B HP MSR20-21 Router
    • JD664A HP MSR20-40 Router
    • JF228A HP MSR20-40 Router
    • JF283A HP MSR20-20 Router
  • MSR20-1X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD431A HP MSR20-10 Router
    • JD667A HP MSR20-15 IW Multi-Service Router
    • JD668A HP MSR20-13 Multi-Service Router
    • JD669A HP MSR20-13 W Multi-Service Router
    • JD670A HP MSR20-15 A Multi-Service Router
    • JD671A HP MSR20-15 AW Multi-Service Router
    • JD672A HP MSR20-15 I Multi-Service Router
    • JD673A HP MSR20-11 Multi-Service Router
    • JD674A HP MSR20-12 Multi-Service Router
    • JD675A HP MSR20-12 W Multi-Service Router
    • JD676A HP MSR20-12 T1 Multi-Service Router
    • JF236A HP MSR20-15-I Router
    • JF237A HP MSR20-15-A Router
    • JF238A HP MSR20-15-I-W Router
    • JF239A HP MSR20-11 Router
    • JF240A HP MSR20-13 Router
    • JF241A HP MSR20-12 Router
    • JF806A HP MSR20-12-T Router
    • JF807A HP MSR20-12-W Router
    • JF808A HP MSR20-13-W Router
    • JF809A HP MSR20-15-A-W Router
    • JF817A HP MSR20-15 Router
    • JG209A HP MSR20-12-T-W Router (NA)
    • JG210A HP MSR20-13-W Router (NA)
  • MSR 30 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD654A HP MSR30-60 POE Multi-Service Router
    • JD657A HP MSR30-40 Multi-Service Router
    • JD658A HP MSR30-60 Multi-Service Router
    • JD660A HP MSR30-20 POE Multi-Service Router
    • JD661A HP MSR30-40 POE Multi-Service Router
    • JD666A HP MSR30-20 Multi-Service Router
    • JF229A HP MSR30-40 Router
    • JF230A HP MSR30-60 Router
    • JF232A HP RTMSR3040-AC-OVSAS-H3
    • JF235A HP MSR30-20 DC Router
    • JF284A HP MSR30-20 Router
    • JF287A HP MSR30-40 DC Router
    • JF801A HP MSR30-60 DC Router
    • JF802A HP MSR30-20 PoE Router
    • JF803A HP MSR30-40 PoE Router
    • JF804A HP MSR30-60 PoE Router
    • JG728A HP MSR30-20 TAA-compliant DC Router
    • JG729A HP MSR30-20 TAA-compliant Router
  • MSR 30-16 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD659A HP MSR30-16 POE Multi-Service Router
    • JD665A HP MSR30-16 Multi-Service Router
    • JF233A HP MSR30-16 Router
    • JF234A HP MSR30-16 PoE Router
  • MSR 30-1X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JF800A HP MSR30-11 Router
    • JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
    • JG182A HP MSR30-11E Router
    • JG183A HP MSR30-11F Router
    • JG184A HP MSR30-10 DC Router
  • MSR 50 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD433A HP MSR50-40 Router
    • JD653A HP MSR50 Processor Module
    • JD655A HP MSR50-40 Multi-Service Router
    • JD656A HP MSR50-60 Multi-Service Router
    • JF231A HP MSR50-60 Router
    • JF285A HP MSR50-40 DC Router
    • JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
  • MSR 50-G2 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JD429A HP MSR50 G2 Processor Module
    • JD429B HP MSR50 G2 Processor Module
  • MSR 9XX (Comware 5) - Version: R2514P10
    • HP Network Products
    • JF812A HP MSR900 Router
    • JF813A HP MSR920 Router
    • JF814A HP MSR900-W Router
    • JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr
    • JG207A HP MSR900-W Router (NA)
    • JG208A HP MSR920-W Router (NA)
  • MSR 93X (Comware 5) - Version: R2514P10
    • HP Network Products
    • JG511A HP MSR930 Router
    • JG511B HP MSR930 Router
    • JG512A HP MSR930 Wireless Router
    • JG513A HP MSR930 3G Router
    • JG513B HP MSR930 3G Router
    • JG514A HP MSR931 Router
    • JG514B HP MSR931 Router
    • JG515A HP MSR931 3G Router
    • JG516A HP MSR933 Router
    • JG517A HP MSR933 3G Router
    • JG518A HP MSR935 Router
    • JG518B HP MSR935 Router
    • JG519A HP MSR935 Wireless Router
    • JG520A HP MSR935 3G Router
    • JG531A HP MSR931 Dual 3G Router
    • JG531B HP MSR931 Dual 3G Router
    • JG596A HP MSR930 4G LTE/3G CDMA Router
    • JG597A HP MSR936 Wireless Router
    • JG665A HP MSR930 4G LTE/3G WCDMA Global Router
    • JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
    • JH009A HP MSR931 Serial (TI) Router
    • JH010A HP MSR933 G.SHDSL (TI) Router
    • JH011A HP MSR935 ADSL2+ (TI) Router
    • JH012A HP MSR930 Wireless 802.11n (NA) Router
    • JH012B HP MSR930 Wireless 802.11n (NA) Router
    • JH013A HP MSR935 Wireless 802.11n (NA) Router
  • MSR1000 (Comware 5) - Version: R2514P10
    • HP Network Products
    • JG732A HP MSR1003-8 AC Router
  • 12500 (Comware 5) - Version: R1829P01
    • HP Network Products
    • JC072B HP 12500 Main Processing Unit
    • JC085A HP A12518 Switch Chassis
    • JC086A HP A12508 Switch Chassis
    • JC652A HP 12508 DC Switch Chassis
    • JC653A HP 12518 DC Switch Chassis
    • JC654A HP 12504 AC Switch Chassis
    • JC655A HP 12504 DC Switch Chassis
    • JC808A HP 12500 TAA Main Processing Unit
    • JF430A HP A12518 Switch Chassis
    • JF430B HP 12518 Switch Chassis
    • JF430C HP 12518 AC Switch Chassis
    • JF431A HP A12508 Switch Chassis
    • JF431B HP 12508 Switch Chassis
    • JF431C HP 12508 AC Switch Chassis
  • 9500E (Comware 5) - Version: R1829P01
    • HP Network Products
    • JC124A HP A9508 Switch Chassis
    • JC124B HP 9505 Switch Chassis
    • JC125A HP A9512 Switch Chassis
    • JC125B HP 9512 Switch Chassis
    • JC474A HP A9508-V Switch Chassis
    • JC474B HP 9508-V Switch Chassis
  • 10500 (Comware 5) - Version: R1210P01
    • HP Network Products
    • JC611A HP 10508-V Switch Chassis
    • JC612A HP 10508 Switch Chassis
    • JC613A HP 10504 Switch Chassis
    • JC614A HP 10500 Main Processing Unit
    • JC748A HP 10512 Switch Chassis
    • JG375A HP 10500 TAA-compliant Main Processing Unit
    • JG820A HP 10504 TAA-compliant Switch Chassis
    • JG821A HP 10508 TAA-compliant Switch Chassis
    • JG822A HP 10508-V TAA-compliant Switch Chassis
    • JG823A HP 10512 TAA-compliant Switch Chassis
  • 7500 (Comware 5) - Version: R6710P01
    • HP Network Products
    • JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo
    • JC697A HP 7502 TAA-compliant Main Processing Unit
    • JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports
    • JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports
    • JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit
    • JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit
    • JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports
    • JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports
    • JD194A HP 7500 384Gbps Fabric Module
    • JD194B HP 7500 384Gbps Fabric Module
    • JD195A HP 7500 384Gbps Advanced Fabric Module
    • JD196A HP 7502 Fabric Module
    • JD220A HP 7500 768Gbps Fabric Module
    • JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports
    • JD238A HP 7510 Switch Chassis
    • JD238B HP 7510 Switch Chassis
    • JD239A HP 7506 Switch Chassis
    • JD239B HP 7506 Switch Chassis
    • JD240A HP 7503 Switch Chassis
    • JD240B HP 7503 Switch Chassis
    • JD241A HP 7506-V Switch Chassis
    • JD241B HP 7506-V Switch Chassis
    • JD242A HP 7502 Switch Chassis
    • JD242B HP 7502 Switch Chassis
    • JD243A HP 7503-S Switch Chassis with 1 Fabric Slot
    • JD243B HP 7503-S Switch Chassis with 1 Fabric Slot
    • JE164A HP E7902 Switch Chassis
    • JE165A HP E7903 Switch Chassis
    • JE166A HP E7903 1 Fabric Slot Switch Chassis
    • JE167A HP E7906 Switch Chassis
    • JE168A HP E7906 Vertical Switch Chassis
    • JE169A HP E7910 Switch Chassis
  • 5830 (Comware 5) - Version: R1118P13
    • HP Network Products
    • JC691A HP 5830AF-48G Switch with 1 Interface Slot
    • JC694A HP 5830AF-96G Switch
    • JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot
    • JG374A HP 5830AF-96G TAA-compliant Switch
  • 5800 (Comware 5) - Version: R1809P11
    • HP Network Products
    • JC099A HP 5800-24G-PoE Switch
    • JC099B HP 5800-24G-PoE+ Switch
    • JC100A HP 5800-24G Switch
    • JC100B HP 5800-24G Switch
    • JC101A HP 5800-48G Switch with 2 Slots
    • JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots
    • JC103A HP 5800-24G-SFP Switch
    • JC103B HP 5800-24G-SFP Switch with 1 Interface Slot
    • JC104A HP 5800-48G-PoE Switch
    • JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot
    • JC105A HP 5800-48G Switch
    • JC105B HP 5800-48G Switch with 1 Interface Slot
    • JG254A HP 5800-24G-PoE+ TAA-compliant Switch
    • JG254B HP 5800-24G-PoE+ TAA-compliant Switch
    • JG255A HP 5800-24G TAA-compliant Switch
    • JG255B HP 5800-24G TAA-compliant Switch
    • JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
    • JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
    • JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
    • JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
    • JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot
    • JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot
    • JG225A HP 5800AF-48G Switch
    • JG225B HP 5800AF-48G Switch
    • JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots
    • JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
    • JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
    • JG243B HP 5820-24XG-SFP+ TAA-compliant Switch
    • JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot
    • JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot
    • JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
    • JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot
    • JG219A HP 5820AF-24XG Switch
    • JG219B HP 5820AF-24XG Switch
    • JC102A HP 5820-24XG-SFP+ Switch
    • JC102B HP 5820-24XG-SFP+ Switch
  • 5500 HI (Comware 5) - Version: R5501P17
    • HP Network Products
    • JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots
    • JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots
    • JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots
    • JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots
    • JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots
    • JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
    • JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
    • JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots
  • 5500 EI (Comware 5) - Version: R2221P19
    • HP Network Products
    • JD373A HP 5500-24G DC EI Switch
    • JD374A HP 5500-24G-SFP EI Switch
    • JD375A HP 5500-48G EI Switch
    • JD376A HP 5500-48G-PoE EI Switch
    • JD377A HP 5500-24G EI Switch
    • JD378A HP 5500-24G-PoE EI Switch
    • JD379A HP 5500-24G-SFP DC EI Switch
    • JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots
    • JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots
    • JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface
    • JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots
    • JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots
    • JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
    • JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
  • 4800G (Comware 5) - Version: R2221P19
    • HP Network Products
    • JD007A HP 4800-24G Switch
    • JD008A HP 4800-24G-PoE Switch
    • JD009A HP 4800-24G-SFP Switch
    • JD010A HP 4800-48G Switch
    • JD011A HP 4800-48G-PoE Switch
  • 5500SI (Comware 5) - Version: R2221P20
    • HP Network Products
    • JD369A HP 5500-24G SI Switch
    • JD370A HP 5500-48G SI Switch
    • JD371A HP 5500-24G-PoE SI Switch
    • JD372A HP 5500-48G-PoE SI Switch
    • JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots
    • JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots
  • 4500G (Comware 5) - Version: R2221P20
    • HP Network Products
    • JF428A HP 4510-48G Switch
    • JF847A HP 4510-24G Switch
  • 5120 EI (Comware 5) - Version: R2221P20
    • HP Network Products
    • JE066A HP 5120-24G EI Switch
    • JE067A HP 5120-48G EI Switch
    • JE068A HP 5120-24G EI Switch with 2 Interface Slots
    • JE069A HP 5120-48G EI Switch with 2 Interface Slots
    • JE070A HP 5120-24G-PoE EI 2-slot Switch
    • JE071A HP 5120-48G-PoE EI 2-slot Switch
    • JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots
    • JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots
    • JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots
    • JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots
    • JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots
    • JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots
  • 4210G (Comware 5) - Version: R2221P20
    • HP Network Products
    • JF844A HP 4210-24G Switch
    • JF845A HP 4210-48G Switch
    • JF846A HP 4210-24G-PoE Switch
  • 5120 SI (Comware 5) - Version: R1516
    • HP Network Products
    • JE072A HP 5120-48G SI Switch
    • JE072B HPE 5120 48G SI Switch
    • JE073A HP 5120-16G SI Switch
    • JE073B HPE 5120 16G SI Switch
    • JE074A HP 5120-24G SI Switch
    • JE074B HPE 5120 24G SI Switch
    • JG091A HP 5120-24G-PoE+ (370W) SI Switch
    • JG091B HPE 5120 24G PoE+ (370W) SI Switch
    • JG092A HP 5120-24G-PoE+ (170W) SI Switch
    • JG309B HPE 5120 8G PoE+ (180W) SI Switch
    • JG310B HPE 5120 8G PoE+ (65W) SI Switch
  • 3610 (Comware 5) - Version: R5319P14
    • HP Network Products
    • JD335A HP 3610-48 Switch
    • JD336A HP 3610-24-4G-SFP Switch
    • JD337A HP 3610-24-2G-2G-SFP Switch
    • JD338A HP 3610-24-SFP Switch
  • 3600V2 (Comware 5) - Version: R2110P06
    • HP Network Products
    • JG299A HP 3600-24 v2 EI Switch
    • JG299B HP 3600-24 v2 EI Switch
    • JG300A HP 3600-48 v2 EI Switch
    • JG300B HP 3600-48 v2 EI Switch
    • JG301A HP 3600-24-PoE+ v2 EI Switch
    • JG301B HP 3600-24-PoE+ v2 EI Switch
    • JG301C HP 3600-24-PoE+ v2 EI Switch
    • JG302A HP 3600-48-PoE+ v2 EI Switch
    • JG302B HP 3600-48-PoE+ v2 EI Switch
    • JG302C HP 3600-48-PoE+ v2 EI Switch
    • JG303A HP 3600-24-SFP v2 EI Switch
    • JG303B HP 3600-24-SFP v2 EI Switch
    • JG304A HP 3600-24 v2 SI Switch
    • JG304B HP 3600-24 v2 SI Switch
    • JG305A HP 3600-48 v2 SI Switch
    • JG305B HP 3600-48 v2 SI Switch
    • JG306A HP 3600-24-PoE+ v2 SI Switch
    • JG306B HP 3600-24-PoE+ v2 SI Switch
    • JG306C HP 3600-24-PoE+ v2 SI Switch
    • JG307A HP 3600-48-PoE+ v2 SI Switch
    • JG307B HP 3600-48-PoE+ v2 SI Switch
    • JG307C HP 3600-48-PoE+ v2 SI Switch
  • 3100V2-48 (Comware 5) - Version: R2110P06
    • HP Network Products
    • JG315A HP 3100-48 v2 Switch
    • JG315B HP 3100-48 v2 Switch
  • HP870 (Comware 5) - Version: R2607P46
    • HP Network Products
    • JG723A HP 870 Unified Wired-WLAN Appliance
    • JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance
  • HP850 (Comware 5) - Version: R2607P46
    • HP Network Products
    • JG722A HP 850 Unified Wired-WLAN Appliance
    • JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance
  • HP830 (Comware 5) - Version: R3507P46
    • HP Network Products
    • JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch
    • JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch
    • JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch
    • JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant
  • HP6000 (Comware 5) - Version: R2507P46
    • HP Network Products
    • JG639A HP 10500/7500 20G Unified Wired-WLAN Module
    • JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module
  • WX5004-EI (Comware 5) - Version: R2507P46
    • HP Network Products
    • JD447B HP WX5002 Access Controller
    • JD448A HP WX5004 Access Controller
    • JD448B HP WX5004 Access Controller
    • JD469A HP WX5004 Access Controller
  • SecBlade FW (Comware 5) - Version: R3181P07
    • HP Network Products
    • JC635A HP 12500 VPN Firewall Module
    • JD245A HP 9500 VPN Firewall Module
    • JD249A HP 10500/7500 Advanced VPN Firewall Module
    • JD250A HP 6600 Firewall Processing Router Module
    • JD251A HP 8800 Firewall Processing Module
    • JD255A HP 5820 VPN Firewall Module
  • F1000-E (Comware 5) - Version: R3181P07
    • HP Network Products
    • JD272A HP F1000-E VPN Firewall Appliance
  • F1000-A-EI (Comware 5) - Version: R3734P08
    • HP Network Products
    • JG214A HP F1000-A-EI VPN Firewall Appliance
  • F1000-S-EI (Comware 5) - Version: R3734P08
    • HP Network Products
    • JG213A HP F1000-S-EI VPN Firewall Appliance
  • F5000-A (Comware 5) - Version: F3210P26
    • HP Network Products
    • JD259A HP A5000-A5 VPN Firewall Chassis
    • JG215A HP F5000 Firewall Main Processing Unit
    • JG216A HP F5000 Firewall Standalone Chassis
  • U200S and CS (Comware 5) - Version: F5123P33
    • HP Network Products
    • JD273A HP U200-S UTM Appliance
  • U200A and M (Comware 5) - Version: F5123P33
    • HP Network Products
    • JD275A HP U200-A UTM Appliance
  • F5000-C/S (Comware 5) - Version: R3811P05
    • HP Network Products
    • JG650A HP F5000-C VPN Firewall Appliance
    • JG370A HP F5000-S VPN Firewall Appliance
  • SecBlade III (Comware 5) - Version: R3820P06
    • HP Network Products
    • JG371A HP 12500 20Gbps VPN Firewall Module
    • JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module
  • 6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JC566A HP 6600 RSE-X1 Router Main Processing Unit
    • JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
  • 6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC165A) HP 6600 RPE-X1 Router Module
    • JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit
  • 6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC176A) HP 6602 Router Chassis
  • HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JC177A HP 6608 Router
    • JC177B HP 6608 Router Chassis
    • JC178A HP 6604 Router Chassis
    • JC178B HP 6604 Router Chassis
    • JC496A HP 6616 Router Chassis
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG355A HP 6600 MCP-X1 Router Main Processing Unit
    • JG356A HP 6600 MCP-X2 Router Main Processing Unit
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
    • JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
  • HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
  • SMB1910 (Comware 5) - Version: R1111
    • HP Network Products
    • JG540A HP 1910-48 Switch
    • JG539A HP 1910-24-PoE+ Switch
    • JG538A HP 1910-24 Switch
    • JG537A HP 1910-8 -PoE+ Switch
    • JG536A HP 1910-8 Switch
  • SMB1920 (Comware 5) - Version: R1109
    • HP Network Products
    • JG928A HP 1920-48G-PoE+ (370W) Switch
    • JG927A HP 1920-48G Switch
    • JG926A HP 1920-24G-PoE+ (370W) Switch
    • JG925A HP 1920-24G-PoE+ (180W) Switch
    • JG924A HP 1920-24G Switch
    • JG923A HP 1920-16G Switch
    • JG922A HP 1920-8G-PoE+ (180W) Switch
    • JG921A HP 1920-8G-PoE+ (65W) Switch
    • JG920A HP 1920-8G Switch
  • V1910 (Comware 5) - Version: R1516
    • HP Network Products
    • JE005A HP 1910-16G Switch
    • JE006A HP 1910-24G Switch
    • JE007A HP 1910-24G-PoE (365W) Switch
    • JE008A HP 1910-24G-PoE(170W) Switch
    • JE009A HP 1910-48G Switch
    • JG348A HP 1910-8G Switch
    • JG349A HP 1910-8G-PoE+ (65W) Switch
    • JG350A HP 1910-8G-PoE+ (180W) Switch
  • SMB 1620 (Comware 5) - Version: R1108
    • HP Network Products
    • JG914A HP 1620-48G Switch
    • JG913A HP 1620-24G Switch
    • JG912A HP 1620-8G Switch

COMWARE 7 Products

  • 12500 (Comware 7) - Version: R7376
    • HP Network Products
    • JC072B HP 12500 Main Processing Unit
    • JC085A HP A12518 Switch Chassis
    • JC086A HP A12508 Switch Chassis
    • JC652A HP 12508 DC Switch Chassis
    • JC653A HP 12518 DC Switch Chassis
    • JC654A HP 12504 AC Switch Chassis
    • JC655A HP 12504 DC Switch Chassis
    • JF430A HP A12518 Switch Chassis
    • JF430B HP 12518 Switch Chassis
    • JF430C HP 12518 AC Switch Chassis
    • JF431A HP A12508 Switch Chassis
    • JF431B HP 12508 Switch Chassis
    • JF431C HP 12508 AC Switch Chassis
    • JG497A HP 12500 MPU w/Comware V7 OS
    • JG782A HP FF 12508E AC Switch Chassis
    • JG783A HP FF 12508E DC Switch Chassis
    • JG784A HP FF 12518E AC Switch Chassis
    • JG785A HP FF 12518E DC Switch Chassis
    • JG802A HP FF 12500E MPU
  • 10500 (Comware 7) - Version: R7170
    • HP Network Products
    • JC611A HP 10508-V Switch Chassis
    • JC612A HP 10508 Switch Chassis
    • JC613A HP 10504 Switch Chassis
    • JC748A HP 10512 Switch Chassis
    • JG608A HP FlexFabric 11908-V Switch Chassis
    • JG609A HP FlexFabric 11900 Main Processing Unit
    • JG820A HP 10504 TAA Switch Chassis
    • JG821A HP 10508 TAA Switch Chassis
    • JG822A HP 10508-V TAA Switch Chassis
    • JG823A HP 10512 TAA Switch Chassis
    • JG496A HP 10500 Type A MPU w/Comware v7 OS
    • JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
    • JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
  • 12900 (Comware 7) - Version: R1138P01
    • HP Network Products
    • JG619A HP FlexFabric 12910 Switch AC Chassis
    • JG621A HP FlexFabric 12910 Main Processing Unit
    • JG632A HP FlexFabric 12916 Switch AC Chassis
    • JG634A HP FlexFabric 12916 Main Processing Unit
    • JH104A HP FlexFabric 12900E Main Processing Unit
    • JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
    • JH263A HP FlexFabric 12904E Main Processing Unit
    • JH255A HP FlexFabric 12908E Switch Chassis
    • JH262A HP FlexFabric 12904E Switch Chassis
    • JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
    • JH103A HP FlexFabric 12916E Switch Chassis
  • 5900 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JC772A HP 5900AF-48XG-4QSFP+ Switch
    • JG296A HP 5920AF-24XG Switch
    • JG336A HP 5900AF-48XGT-4QSFP+ Switch
    • JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
    • JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
    • JG555A HP 5920AF-24XG TAA Switch
    • JG838A HP FF 5900CP-48XG-4QSFP+ Switch
    • JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
    • JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
    • JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
  • MSR1000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG875A HP MSR1002-4 AC Router
    • JH060A HP MSR1003-8S AC Router
  • MSR2000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG411A HP MSR2003 AC Router
    • JG734A HP MSR2004-24 AC Router
    • JG735A HP MSR2004-48 Router
    • JG866A HP MSR2003 TAA-compliant AC Router
  • MSR3000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG404A HP MSR3064 Router
    • JG405A HP MSR3044 Router
    • JG406A HP MSR3024 AC Router
    • JG407A HP MSR3024 DC Router
    • JG408A HP MSR3024 PoE Router
    • JG409A HP MSR3012 AC Router
    • JG410A HP MSR3012 DC Router
    • JG861A HP MSR3024 TAA-compliant AC Router
  • MSR4000 (Comware 7) - Version: R0305P04
    • HP Network Products
    • JG402A HP MSR4080 Router Chassis
    • JG403A HP MSR4060 Router Chassis
    • JG412A HP MSR4000 MPU-100 Main Processing Unit
    • JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
  • VSR (Comware 7) - Version: E0321P01
    • HP Network Products
    • JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
    • JG811AAE HP VSR1001 Comware 7 Virtual Services Router
    • JG812AAE HP VSR1004 Comware 7 Virtual Services Router
    • JG813AAE HP VSR1008 Comware 7 Virtual Services Router
  • 7900 (Comware 7) - Version: R2138P01
    • HP Network Products
    • JG682A HP FlexFabric 7904 Switch Chassis
    • JG841A HP FlexFabric 7910 Switch Chassis
    • JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
    • JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
    • JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
    • JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
    • JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
    • JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
  • 5130 (Comware 7) - Version: R3109P16
    • HP Network Products
    • JG932A HP 5130-24G-4SFP+ EI Switch
    • JG933A HP 5130-24G-SFP-4SFP+ EI Switch
    • JG934A HP 5130-48G-4SFP+ EI Switch
    • JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
    • JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
    • JG938A HP 5130-24G-2SFP+-2XGT EI Switch
    • JG939A HP 5130-48G-2SFP+-2XGT EI Switch
    • JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG975A HP 5130-24G-4SFP+ EI Brazil Switch
    • JG976A HP 5130-48G-4SFP+ EI Brazil Switch
    • JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
    • JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
  • 5700 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
    • JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
    • JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
    • JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
    • JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
    • JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
  • 5930 (Comware 7) - Version: R2422P01
    • HP Network Products
    • JG726A HP FlexFabric 5930 32QSFP+ Switch
    • JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
    • JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
    • JH179A HP FlexFabric 5930 4-slot Switch
    • JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
    • JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
  • HSR6600 (Comware 7) - Version: R7103P05
    • HP Network Products
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
  • HSR6800 (Comware 7) - Version: R7103P05
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
    • JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
  • 1950 (Comware 7) - Version: R3109P16
    • HP Network Products
    • JG960A HP 1950-24G-4XG Switch
    • JG961A HP 1950-48G-2SFP+-2XGT Switch
    • JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
    • JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
  • 7500 (Comware 7) - Version: R7170
    • HP Network Products
    • JD238C HP 7510 Switch Chassis
    • JD239C HP 7506 Switch Chassis
    • JD240C HP 7503 Switch Chassis
    • JD242C HP 7502 Switch Chassis
    • JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
    • JH208A HP 7502 Main Processing Unit
    • JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit

iMC Products

  • iMC Plat - Version: iMC Plat 7.1 E0303P16
    • HP Network Products
    • JD125A HP IMC Std S/W Platform w/100-node
    • JD126A HP IMC Ent S/W Platform w/100-node
    • JD808A HP IMC Ent Platform w/100-node License
    • JD814A HP A-IMC Enterprise Edition Software DVD Media
    • JD815A HP IMC Std Platform w/100-node License
    • JD816A HP A-IMC Standard Edition Software DVD Media
    • JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU
    • JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU
    • JF377A HP IMC Std S/W Platform w/100-node Lic
    • JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
    • JF378A HP IMC Ent S/W Platform w/200-node Lic
    • JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
    • JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
    • JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
    • JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
    • JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
    • JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
    • JG659AAE HP IMC Smart Connect VAE E-LTU
    • JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
    • JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
    • JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
    • JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
    • JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
    • JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
  • iMC iNode - Version: iNode PC 7.1 E0313, or, iNode PC 7.2 (E0401)
    • HP Network Products
    • JD144A HP A-IMC User Access Management Software Module with 200-user License
    • JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License
    • JD435A HP A-IMC Endpoint Admission Defense Client Software
    • JF388A HP IMC User Authentication Management Software Module with 200-user License
    • JF388AAE HP IMC User Authentication Management Software Module with 200-user E-LTU
    • JF391A HP IMC Endpoint Admission Defense Software Module with 200-user License
    • JF391AAE HP IMC Endpoint Admission Defense Software Module with 200-user E-LTU
    • JG752AAE HP IMC User Access Manager Software Module with 50-user E-LTU
    • JG754AAE) HP IMC Endpoint Admission Defense Software Module with 50-user E-LTU
  • iMC TAM_UAM - Version: iMC UAM_TAM 7.1 (E0307)
    • HP Network Products
    • JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
    • JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
    • JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
    • JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
    • JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
    • JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU
  • iMC NSM - Version: iMC WSM 7.1 E0303P10
    • HP Network Products
    • JD456A HP IMC WSM Software Module with 50-Access Point License
    • JF414A HP IMC Wireless Service Manager Software Module with 50-Access Point License
    • JF414AAE HP IMC Wireless Service Manager Software Module with 50-Access Point E-LTU
    • JG551AAE HP PCM+ Mobility Manager to IMC Wireless Service Manager Module Upgrade with 250 Access Point E-LTU
    • JG758AAE HP IMC WSM/RTLS w/ 50-node E-LTU
    • JG769AAE HP PCM Mobility Manager to IMC Wireless Service Manager Upg with 250-node E-LTU

VCX Products

  • VCX - Version: 9.8.18
    • HP Network Products
    • J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
    • J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
    • JC517A HP VCX V7205 Platform w/DL 360 G6 Server
    • JE355A HP VCX V6000 Branch Platform 9.0
    • JC516A HP VCX V7005 Platform w/DL 120 G6 Server
    • JC518A HP VCX Connect 200 Primry 120 G6 Server
    • J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
    • JE341A HP VCX Connect 100 Secondary
    • JE252A HP VCX Connect Primary MIM Module
    • JE253A HP VCX Connect Secondary MIM Module
    • JE254A HP VCX Branch MIM Module
    • JE355A HP VCX V6000 Branch Platform 9.0
    • JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
    • JD023A HP MSR30-40 Router with VCX MIM Module
    • JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
    • JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
    • JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
    • JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
    • JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
    • JE340A HP VCX Connect 100 Pri Server 9.0
    • JE342A HP VCX Connect 100 Sec Server 9.0

HISTORY Version:1 (rev.1) - 5 July 2016 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-15:10.openssl Security Advisory The FreeBSD Project

Topic: Multiple OpenSSL vulnerabilities

Category: contrib Module: openssl Announced: 2015-06-12 Affects: All supported versions of FreeBSD. Corrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE) 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12) 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE) 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16) 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE) 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30) CVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 CVE-2015-1792, CVE-2015-4000

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

II. [CVE-2015-1791]

The OpenSSL advisory also describes a problem that is identified as CVE-2014-8176, which is already fixed by an earlier FreeBSD Errata Notice, FreeBSD-EN-15:02.openssl.

III. [CVE-2015-4000]. [CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem was no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]

An attacker may be able to crash multi-thread applications that supports resumed TLS handshakes. [CVE-2015-1791]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.1]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc

gpg --verify openssl-10.1.patch.asc

[FreeBSD 9.3 and 8.4]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r284286 releng/8.4/ r284295 stable/9/ r284286 releng/9.3/ r284295 stable/10/ r284285 releng/10.1/ r284295


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.4 (FreeBSD)

iQIcBAEBCgAGBQJVeopGAAoJEO1n7NZdz2rnzhQP/Ak6el188Y+7QbEYVfCZ7eG8 BQLj5TMGHV5swSKVlPcEuBlMwTjpgB5Gqhc8luDS0eIAuJGdcMPSrZDdXxWQFtPf pbfIwp/ElFc7d6ut0Y8t6fFLJbhTOoHJpzTGkFRfJkjinGOx7OZQPeLJsxSubbnL JKugZ3diH6yk6IPMf9SvhO/kYXUF1VbXQvHNTnqgdhFVkgF6tK22Pkl2XoJ9EHbh vBXft1yJwiYlZ//DxZuScTUj1pHYzK3bOpg//REJMWCMj1RVwQr2EyDa0Q2cT02d eRnSZykXD69eybyzEck+BvwnUYYJICimnHuE5t78UIr0D/NWyOAZTQ99z5TID5aV HXkcil+1E/Q+xBB4+5UOOnESf6cmiWwewQOVvD26ZY39E6oJXvsrWnyxIuCG6DL9 sLtxB6iTYlTX5Civ/VJX8H7rFiw4UwMembthvGzck22026iHjplWM3GCWz0E8O3R PrXBHjAzNFawK3owNMxFSUFTuFw/qY7EEwJ3SKCEC+hoxcLOl26NMxrQKRIAUk+I MMOaZfvOh2uM19y9SJZz8+sqU8gIm7ihDm5fuSkO8kY0jdvLwyS9bXAejN/lZ6oJ TyfTDDyXDOdaPpnpQehh6vQV0NiaJ+WXfGhfiE8/G/t6b1E0LlCaaGJTpYkildGe vVCM4Nyx4S9WDFOi76ug =dyhg -----END PGP SIGNATURE----- .

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz: Upgraded. Fixes several bugs and security issues: o Malformed ECParameters causes infinite loop (CVE-2015-1788) o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789) o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790) o CMS verify infinite loop with unknown hash function (CVE-2015-1792) o Race condition handling NewSessionTicket (CVE-2015-1791) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791 ( Security fix ) patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz: Upgraded. +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 383ecfed6bfef1440a44d7082745848a openssl-0.9.8zg-i486-1_slack13.0.txz fb186187ffa200e22d9450a9d0e321f6 openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: eb52318ed52fef726402f0b2a74745c5 openssl-0.9.8zg-x86_64-1_slack13.0.txz 9447927b960a01b21149e28a9783021f openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 37f46f6b4fe2acbe217eaf7c0b33b704 openssl-0.9.8zg-i486-1_slack13.1.txz 986de2e71676f61d788a59a1e0c8de1f openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: 6b160ce817dcde3ae5b3a861b284387b openssl-0.9.8zg-x86_64-1_slack13.1.txz 503d891680c711162386ea7e3daadca8 openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 5e7501b1d73d01d3d87704c3cfd3a888 openssl-0.9.8zg-i486-1_slack13.37.txz 874f0b59870dd3f259640c9930a02f99 openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: b6d91614458040d461dff3c3eab45206 openssl-0.9.8zg-x86_64-1_slack13.37.txz be106df5e59c2be7fa442df8ba85ad0b openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Slackware 14.0 packages: ee7c3937e6a6d7ac7537f751af7da7b9 openssl-1.0.1n-i486-1_slack14.0.txz 758662437d33f99ec0a686cedeb1919e openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 2dfdc4729e93cf460018e9e30a6223dc openssl-1.0.1n-x86_64-1_slack14.0.txz 9cb4b34e97e60f6bfe4c843aabeae954 openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 5a9bf08d55615cfc097109c2e3786f7b openssl-1.0.1n-i486-1_slack14.1.txz fb1c05468e5c38d51a8ff6ac435e3a20 openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: 1ef5cede3f954c3e4741012ffa76b750 openssl-1.0.1n-x86_64-1_slack14.1.txz ea22c288c60ae1d7ea8c5b3a1608462b openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Slackware -current packages: 56db8712d653c060f910e8915a8f8656 a/openssl-solibs-1.0.1n-i586-1.txz 6d6264c9943e27240db5c8f5ec342e27 n/openssl-1.0.1n-i586-1.txz

Slackware x86_64 -current packages: e73f7aff5aa0ad14bc06428544f99ae2 a/openssl-solibs-1.0.1n-x86_64-1.txz 91b550b9eb0ac0c580e158375a93c0e4 n/openssl-1.0.1n-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.

Please download the latest version of HPE Version Control Repository Manager (VCRM) (7.5.1) from the following location:

VCRM for Windows:

https://www.hp.com/swpublishing/MTX-b59b11be53744759a650eadeb4

VCRM for Linux is only available only with HPE Systems Insight Manager (HPE SIM):

https://www.hp.com/go/sim

HISTORY Version:1 (rev.1) - 12 May 2016 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0231",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0r",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zf",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.1",
         },
         {
            model: "db2 advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.10",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.14",
         },
         {
            model: "db2 express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.11",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "cloud manager with openstack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3.0.0",
         },
         {
            model: "db2 workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "db2® connect? unlimited edition for system z®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "db2 connect unlimited edition for system i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0.0",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.15",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "db2 connect unlimited edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "hp-ux b.11.22",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.18",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "15.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "db2® express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.3",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 14.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.13",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.6",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.12",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.14",
         },
         {
            model: "junos 13.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "db2® connect? application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "db2 luw",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5.0.6",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.04",
         },
         {
            model: "db2 connect enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.2",
         },
         {
            model: "ascenlink",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "7.2.3",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.19",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "hp-ux b.11.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "workflow for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "db2® connect? unlimited edition for system i®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "imc products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37001.1",
         },
         {
            model: "rational requisitepro",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.9",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.4",
         },
         {
            model: "websphere transformation extender secure adapter collection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1.3",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "junos 14.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.1.8",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.15",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "communications security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.3",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "db2 connect application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.13",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "tivoli endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50001.1",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "flashsystem 9848-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "elastic storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.3",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.8",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "db2® connect? unlimited edition for system z®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.3",
         },
         {
            model: "db2® connect? enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.10.38",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.8",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "db2 advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational developer for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1.3",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.2",
         },
         {
            model: "junos 12.3x48-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere transformation extender secure adapter collection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1.1",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.33",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.11",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v310.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.15",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.9",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "rational requisitepro",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.18",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "db2 workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.19",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.6",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "db2 connect unlimited edition for system i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.03",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "db2 connect? application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 15.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2",
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.6",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "junos 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.1.8",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "smartcloud provisioning for software virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.1.8",
         },
         {
            model: "rational policy tester",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "db2® enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "junos 14.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.10",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.12",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "project openssl 1.0.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.9",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.4",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling connect:enterprise for unix ifix03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.1",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.7",
         },
         {
            model: "tivoli netcool system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.1",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "db2® workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "general parallel file system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0.28",
         },
         {
            model: "security network controller 1.0.3387m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "junos 12.1x44-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "db2® connect? enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "junos 15.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.8",
         },
         {
            model: "db2® advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2.0.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "50",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "exalogic infrastructure eecs",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.4",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.38",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "websphere transformation extender secure adapter collection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4.1.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.1",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.6",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "hp-ux b.11.11.16.09",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.5",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.4",
         },
         {
            model: "db2 advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "junos 12.3x48-d30",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud entry fixpack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.413",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.0",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "elastic storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.38",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "db2® enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.0.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "hp-ux b.11.11.13.14",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "junos 14.1r6",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.7",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.16",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.3",
         },
         {
            model: "pureapplication system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.0",
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.10",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "db2 express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.4",
         },
         {
            model: "tivoli endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.11",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "70",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.12",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.1.7",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v39.7",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0.1",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.3",
         },
         {
            model: "hp-ux b.11.23.1.007",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "db2® express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.5",
         },
         {
            model: "smartcloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.7",
         },
         {
            model: "db2 developer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "forticlient windows/mac",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.3",
         },
         {
            model: "smartcloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.31",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "db2 connect enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "flashsystem 9848-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "flashsystem 9840-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "security directory server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.34",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "db2 luw",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.0.5",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.4.0.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.9",
         },
         {
            model: "db2® workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "tivoli endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "db2® connect? unlimited edition for system i®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "db2® advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.2.0",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.12.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.5",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "flashsystem 9846-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.3.0",
         },
         {
            model: "db2® connect? application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.16",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.10",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.1",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "secure backup",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.3",
         },
         {
            model: "linux x86 64 -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.4.0.6",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "junos 14.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.3",
         },
         {
            model: "rational developer for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.0.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "fortivoice enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.6",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "flashsystem 9846-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "db2 connect application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.19",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.1",
         },
         {
            model: "hp-ux b.11.11.02.008",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.11",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.16",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 12.1x46-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "db2 connect unlimited advanced edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "netinsight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0.14",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tivoli directory server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.35",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.21.0",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "cloud manager with openstack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "rational developer for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.12",
         },
         {
            model: "db2 express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.9",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.19",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "db2® advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl 0.9.8zg",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.13",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "mobile connect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.5",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4.0.6",
         },
         {
            model: "junos 13.2x51-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "powerkvm build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.157",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.17",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.8",
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "db2® express edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.12",
         },
         {
            model: "project openssl 1.0.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "db2 connect enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "vcx products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "db2 connect unlimited edition for system i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "junos 12.1x47-d45",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "spectrum scale",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.10",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "db2 connect unlimited edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "db2 purescale feature",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "elastic storage server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.37",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "spectrum scale",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1.0",
         },
         {
            model: "elastic storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tivoli netcool system service monitor fp14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "flashsystem 9843-ae2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "db2® connect? unlimited edition for system i®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.12.0",
         },
         {
            model: "junos 12.1x44-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "pureapplication system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.6",
         },
         {
            model: "gpfs storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "elastic storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "hp-ux b.11.11.17.02",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "general parallel file system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "fortiddos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "linux enterprise server sp4 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational requisitepro",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "db2 connect application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "hp-ux b.11.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.13",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "forticlient ios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.41",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.19",
         },
         {
            model: "forticlient android",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.6",
         },
         {
            model: "db2 connect application server advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.19",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.1.8",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "hp-ux b.11.23.07.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.7",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.3.0.5",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system networking rackswitch g8316",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.6",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1.0.7",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.6",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.1",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "security directory server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1",
         },
         {
            model: "elastic storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "db2 advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 12.1x46-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.3",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.2",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "junos 12.3r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "elastic storage server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "tivoli monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.32",
         },
         {
            model: "db2® connect? unlimited edition for system z®",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "linux enterprise server sp1 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.18",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.13",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.07",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "db2 advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos 13.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "tivoli monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.1",
         },
         {
            model: "rational developer for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1",
         },
         {
            model: "junos 15.1x49-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "tivoli endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "forticache",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "db2® advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "db2 advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "junos 14.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.3",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "workload deployer if9",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.3",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.3.0.12",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "flashsystem 9848-ac0",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.7",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.2",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.16",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.33",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.37",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35001.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "db2 purescale feature for enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.8",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.7",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "flashsystem 9846-ac1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v840",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50006.2",
         },
         {
            model: "db2® connect? application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "fsso build",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "235",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "db2 connect unlimited edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "hp-ux b.11.11.14.15",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2",
         },
         {
            model: "cloud orchestrator enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.1",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "db2® workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.20.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.1.0.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "fortiadc",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.5.0.3",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "db2® connect? enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "db2® advanced enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "junos 12.1x47-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.12",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.7",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "gpfs storage server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.15",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.0",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "db2 workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.8",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.12",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "hp-ux b.11.11.15.13",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "db2 connect? application server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.5.0.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.2",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.8",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "db2 enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "db2 connect application server advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.5",
         },
         {
            model: "junos 15.1x49-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 14.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.5",
         },
         {
            model: "db2® advanced workgroup server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "personal communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.3",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.1.0.6",
         },
         {
            model: "san volume controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.1",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.4.0.6",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.32",
         },
         {
            model: "cloud orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.2.0.8",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37007.5",
         },
         {
            model: "db2® enterprise server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35007.5.0.3",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.12",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v50007.3.0.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security identity manager virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.2.0.8",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "db2 connect unlimited advanced edition for system z",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "spectrum scale",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1.1",
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.214",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "15.04",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "75158",
         },
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Joseph Birr-Pixton",
      sources: [
         {
            db: "BID",
            id: "75158",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-1788",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2015-1788",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-1788",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-1788",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\n\nFixes for this issue were developed by Emilia Käsper and Kurt Roeckx\nof the OpenSSL development team. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates.  This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno Böck. The fix\nwas developed by Emilia Käsper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by  Michal\nZalewski (Google). The fix was developed by Emilia Käsper of the\nOpenSSL development team. \n\nCMS verify infinite loop with unknown hash function (CVE-2015-1792)\n===================================================================\n\nSeverity: Moderate\n\nWhen verifying a signedData message the CMS code can enter an infinite loop\nif presented with an unknown hash function OID. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nRace condition handling NewSessionTicket (CVE-2015-1791)\n========================================================\n\nSeverity: Low\n\nIf a NewSessionTicket is received by a multi-threaded client when attempting to\nreuse a previous ticket then a race condition can occur potentially leading to\na double free of the ticket data. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was discovered by Emilia Käsper of the OpenSSL development team. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nInvalid free in DTLS (CVE-2014-8176)\n====================================\n\nSeverity: Moderate\n\nThis vulnerability does not affect current versions of OpenSSL. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201506-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: June 22, 2015\n     Bugs: #551832\n       ID: 201506-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL that can result in\neither Denial of Service or information disclosure. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1o               >= 0.9.8z_p7\n                                                            >= 1.0.1o\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1o\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-8176\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176\n[ 2 ] CVE-2015-1788\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788\n[ 3 ] CVE-2015-1789\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789\n[ 4 ] CVE-2015-1790\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790\n[ 5 ] CVE-2015-1791\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791\n[ 6 ] CVE-2015-1792\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792\n[ 7 ] CVE-2015-4000\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201506-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. ============================================================================\nUbuntu Security Notice USN-2639-1\nJune 11, 2015\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \n\nSoftware Description:\n- openssl: Secure Socket Layer (SSL) cryptographic library and tools\n\nDetails:\n\nPraveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that\nOpenSSL incorrectly handled memory when buffering DTLS data. (CVE-2014-8176)\n\nJoseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed\nECParameters structures. (CVE-2015-1788)\n\nRobert Swiecki and Hanno B=C3=B6ck discovered that OpenSSL incorrectly handled\ncertain ASN1_TIME strings. \n(CVE-2015-1791)\n\nJohannes Bauer discovered that OpenSSL incorrectly handled verifying\nsignedData messages using the CMS code. \n(CVE-2015-1792)\n\nAs a security improvement, this update also modifies OpenSSL behaviour to\nreject DH key sizes below 768 bits, preventing a possible downgrade\nattack. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n  libssl1.0.0                     1.0.1f-1ubuntu11.4\n\nUbuntu 14.10:\n  libssl1.0.0                     1.0.1f-1ubuntu9.8\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.15\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.31\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2639-1\n  CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790,\n  CVE-2015-1791, CVE-2015-1792\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n\na-c05184351\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05184351\nVersion: 1\n\nHPSBHF03613 rev.1 - HPE Network Products including iMC, VCX, and Comware\nusing OpenSSL, Remote Denial of Service (DoS), Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-07-05\nLast Updated: 2016-07-05\n\nPotential Security Impact: Remote Denial of Service (DoS), Unauthorized\nAccess\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities in OpenSSL have been addressed with HPE\nnetwork products including iMC, VCX, Comware 5 and Comware 7. The\nvulnerabilities could be exploited remotely resulting in Denial of Service\n(DoS) or unauthorized access. \n\nReferences:\n\n  - CVE-2014-8176 - Remote Denial of Service (DoS)\n  - CVE-2015-1788 - Remote Denial of Service (DoS)\n  - CVE-2015-1789 - Remote Denial of Service (DoS)\n  - CVE-2015-1790 - Remote Denial of Service (DoS)\n  - CVE-2015-1791 - Remote Denial of Service (DoS)\n  - CVE-2015-1792 - Remote Denial of Service (DoS)\n  - CVE-2015-1793 - Remote Unauthorized Access\n  - PSRT110158, SSRT102264\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nPlease refer to the RESOLUTION\n below for a list of impacted products. \n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2014-8176\n      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n      7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n    CVE-2015-1788\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2015-1789\n      3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2015-1790\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n    CVE-2015-1791\n      5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2015-1792\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n    CVE-2015-1793\n      6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\n      6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\n      https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI\nd=emr_na-c01345499\n\nRESOLUTION\nHPE has released the following software updates to resolve the\nvulnerabilities in the HP network products including iMC, VCX, Comware 5 and\nComware 7. \n\n**COMWARE 5 Products**\n\n  + **A6600 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JC165A HP 6600 RPE-X1 Router Module\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n      - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n      - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n  + **HSR6602 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JC176A HP 6602 Router Chassis\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n      - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n      - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n  + **HSR6800 (Comware 5) - Version: R3303P23**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n  + **MSR20 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD432A HP A-MSR20-21 Router\n      - JD662A HP MSR20-20 Router\n      - JD663A HP A-MSR20-21 Router\n      - JD663B HP MSR20-21 Router\n      - JD664A HP MSR20-40 Router\n      - JF228A HP MSR20-40 Router\n      - JF283A HP MSR20-20 Router\n  + **MSR20-1X  (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD431A HP MSR20-10 Router\n      - JD667A HP MSR20-15 IW Multi-Service Router\n      - JD668A HP MSR20-13 Multi-Service Router\n      - JD669A HP MSR20-13 W Multi-Service Router\n      - JD670A HP MSR20-15 A Multi-Service Router\n      - JD671A HP MSR20-15 AW Multi-Service Router\n      - JD672A HP MSR20-15 I Multi-Service Router\n      - JD673A HP MSR20-11 Multi-Service Router\n      - JD674A HP MSR20-12 Multi-Service Router\n      - JD675A HP MSR20-12 W Multi-Service Router\n      - JD676A HP MSR20-12 T1 Multi-Service Router\n      - JF236A HP MSR20-15-I Router\n      - JF237A HP MSR20-15-A Router\n      - JF238A HP MSR20-15-I-W Router\n      - JF239A HP MSR20-11 Router\n      - JF240A HP MSR20-13 Router\n      - JF241A HP MSR20-12 Router\n      - JF806A HP MSR20-12-T Router\n      - JF807A HP MSR20-12-W Router\n      - JF808A HP MSR20-13-W Router\n      - JF809A HP MSR20-15-A-W Router\n      - JF817A HP MSR20-15 Router\n      - JG209A HP MSR20-12-T-W Router (NA)\n      - JG210A HP MSR20-13-W Router (NA)\n  + **MSR 30 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD654A HP MSR30-60 POE Multi-Service Router\n      - JD657A HP MSR30-40 Multi-Service Router\n      - JD658A HP MSR30-60 Multi-Service Router\n      - JD660A HP MSR30-20 POE Multi-Service Router\n      - JD661A HP MSR30-40 POE Multi-Service Router\n      - JD666A HP MSR30-20 Multi-Service Router\n      - JF229A HP MSR30-40 Router\n      - JF230A HP MSR30-60 Router\n      - JF232A HP RTMSR3040-AC-OVSAS-H3\n      - JF235A HP MSR30-20 DC Router\n      - JF284A HP MSR30-20 Router\n      - JF287A HP MSR30-40 DC Router\n      - JF801A HP MSR30-60 DC Router\n      - JF802A HP MSR30-20 PoE Router\n      - JF803A HP MSR30-40 PoE Router\n      - JF804A HP MSR30-60 PoE Router\n      - JG728A HP MSR30-20 TAA-compliant DC Router\n      - JG729A HP MSR30-20 TAA-compliant Router\n  + **MSR 30-16 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD659A HP MSR30-16 POE Multi-Service Router\n      - JD665A HP MSR30-16 Multi-Service Router\n      - JF233A HP MSR30-16 Router\n      - JF234A HP MSR30-16 PoE Router\n  + **MSR 30-1X (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JF800A HP MSR30-11 Router\n      - JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\n      - JG182A HP MSR30-11E Router\n      - JG183A HP MSR30-11F Router\n      - JG184A HP MSR30-10 DC Router\n  + **MSR 50 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD433A HP MSR50-40 Router\n      - JD653A HP MSR50 Processor Module\n      - JD655A HP MSR50-40 Multi-Service Router\n      - JD656A HP MSR50-60 Multi-Service Router\n      - JF231A HP MSR50-60 Router\n      - JF285A HP MSR50-40 DC Router\n      - JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n  + **MSR 50-G2 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JD429A HP MSR50 G2 Processor Module\n      - JD429B HP MSR50 G2 Processor Module\n  + **MSR 9XX (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JF812A HP MSR900 Router\n      - JF813A HP MSR920 Router\n      - JF814A HP MSR900-W Router\n      - JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr\n      - JG207A HP MSR900-W Router (NA)\n      - JG208A HP MSR920-W Router (NA)\n  + **MSR 93X (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JG511A HP MSR930 Router\n      - JG511B HP MSR930 Router\n      - JG512A HP MSR930 Wireless Router\n      - JG513A HP MSR930 3G Router\n      - JG513B HP MSR930 3G Router\n      - JG514A HP MSR931 Router\n      - JG514B HP MSR931 Router\n      - JG515A HP MSR931 3G Router\n      - JG516A HP MSR933 Router\n      - JG517A HP MSR933 3G Router\n      - JG518A HP MSR935 Router\n      - JG518B HP MSR935 Router\n      - JG519A HP MSR935 Wireless Router\n      - JG520A HP MSR935 3G Router\n      - JG531A HP MSR931 Dual 3G Router\n      - JG531B HP MSR931 Dual 3G Router\n      - JG596A HP MSR930 4G LTE/3G CDMA Router\n      - JG597A HP MSR936 Wireless Router\n      - JG665A HP MSR930 4G LTE/3G WCDMA Global Router\n      - JG704A HP MSR930 4G LTE/3G WCDMA  ATT Router\n      - JH009A HP MSR931 Serial (TI) Router\n      - JH010A HP MSR933 G.SHDSL (TI) Router\n      - JH011A HP MSR935 ADSL2+ (TI) Router\n      - JH012A HP MSR930 Wireless 802.11n (NA) Router\n      - JH012B HP MSR930 Wireless 802.11n (NA) Router\n      - JH013A HP MSR935 Wireless 802.11n (NA) Router\n  + **MSR1000 (Comware 5) - Version: R2514P10**\n    * HP Network Products\n      - JG732A HP MSR1003-8 AC Router\n  + **12500 (Comware 5) - Version: R1829P01**\n    * HP Network Products\n      - JC072B HP 12500 Main Processing Unit\n      - JC085A HP A12518 Switch Chassis\n      - JC086A HP A12508 Switch Chassis\n      - JC652A HP 12508 DC Switch Chassis\n      - JC653A HP 12518 DC Switch Chassis\n      - JC654A HP 12504 AC Switch Chassis\n      - JC655A HP 12504 DC Switch Chassis\n      - JC808A HP 12500 TAA Main Processing Unit\n      - JF430A HP A12518 Switch Chassis\n      - JF430B HP 12518 Switch Chassis\n      - JF430C HP 12518 AC Switch Chassis\n      - JF431A HP A12508 Switch Chassis\n      - JF431B HP 12508 Switch Chassis\n      - JF431C HP 12508 AC Switch Chassis\n  + **9500E (Comware 5) - Version: R1829P01**\n    * HP Network Products\n      - JC124A HP A9508 Switch Chassis\n      - JC124B HP 9505 Switch Chassis\n      - JC125A HP A9512 Switch Chassis\n      - JC125B HP 9512 Switch Chassis\n      - JC474A HP A9508-V Switch Chassis\n      - JC474B HP 9508-V Switch Chassis\n  + **10500 (Comware 5) - Version: R1210P01**\n    * HP Network Products\n      - JC611A HP 10508-V Switch Chassis\n      - JC612A HP 10508 Switch Chassis\n      - JC613A HP 10504 Switch Chassis\n      - JC614A HP 10500 Main Processing Unit\n      - JC748A HP 10512 Switch Chassis\n      - JG375A HP 10500 TAA-compliant Main Processing Unit\n      - JG820A HP 10504 TAA-compliant Switch Chassis\n      - JG821A HP 10508 TAA-compliant Switch Chassis\n      - JG822A HP 10508-V TAA-compliant Switch Chassis\n      - JG823A HP 10512 TAA-compliant Switch Chassis\n  + **7500 (Comware 5) - Version: R6710P01**\n    * HP Network Products\n      - JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port\nGig-T/4-port GbE Combo\n      - JC697A HP 7502 TAA-compliant Main Processing Unit\n      - JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8\nGbE Combo Ports\n      - JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP\nPorts\n      - JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit\n      - JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit\n      - JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports\n      - JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports\n      - JD194A HP 7500 384Gbps Fabric Module\n      - JD194B HP 7500 384Gbps Fabric Module\n      - JD195A HP 7500 384Gbps Advanced Fabric Module\n      - JD196A HP 7502 Fabric Module\n      - JD220A HP 7500 768Gbps Fabric Module\n      - JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports\n      - JD238A HP 7510 Switch Chassis\n      - JD238B HP 7510 Switch Chassis\n      - JD239A HP 7506 Switch Chassis\n      - JD239B HP 7506 Switch Chassis\n      - JD240A HP 7503 Switch Chassis\n      - JD240B HP 7503 Switch Chassis\n      - JD241A HP 7506-V Switch Chassis\n      - JD241B HP 7506-V Switch Chassis\n      - JD242A HP 7502 Switch Chassis\n      - JD242B HP 7502 Switch Chassis\n      - JD243A HP 7503-S Switch Chassis with 1 Fabric Slot\n      - JD243B HP 7503-S Switch Chassis with 1 Fabric Slot\n      - JE164A HP E7902 Switch Chassis\n      - JE165A HP E7903 Switch Chassis\n      - JE166A HP E7903 1 Fabric Slot Switch Chassis\n      - JE167A HP E7906 Switch Chassis\n      - JE168A HP E7906 Vertical Switch Chassis\n      - JE169A HP E7910 Switch Chassis\n  + **5830 (Comware 5) - Version: R1118P13**\n    * HP Network Products\n      - JC691A HP 5830AF-48G Switch with 1 Interface Slot\n      - JC694A HP 5830AF-96G Switch\n      - JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot\n      - JG374A HP 5830AF-96G TAA-compliant Switch\n  + **5800 (Comware 5) - Version: R1809P11**\n    * HP Network Products\n      - JC099A HP 5800-24G-PoE Switch\n      - JC099B HP 5800-24G-PoE+ Switch\n      - JC100A HP 5800-24G Switch\n      - JC100B HP 5800-24G Switch\n      - JC101A HP 5800-48G Switch with 2 Slots\n      - JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots\n      - JC103A HP 5800-24G-SFP Switch\n      - JC103B HP 5800-24G-SFP Switch with 1 Interface Slot\n      - JC104A HP 5800-48G-PoE Switch\n      - JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot\n      - JC105A HP 5800-48G Switch\n      - JC105B HP 5800-48G Switch with 1 Interface Slot\n      - JG254A HP 5800-24G-PoE+ TAA-compliant Switch\n      - JG254B HP 5800-24G-PoE+ TAA-compliant Switch\n      - JG255A HP 5800-24G TAA-compliant Switch\n      - JG255B HP 5800-24G TAA-compliant Switch\n      - JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n      - JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n      - JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n      - JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n      - JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n      - JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n      - JG225A HP 5800AF-48G Switch\n      - JG225B HP 5800AF-48G Switch\n      - JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots\n      - JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface\n      - JG243A HP 5820-24XG-SFP+ TAA-compliant Switch\n      - JG243B HP 5820-24XG-SFP+ TAA-compliant Switch\n      - JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\n& 1 OAA Slot\n      - JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\nand 1 OAA Slot\n      - JC106A HP 5820-14XG-SFP+ Switch with 2 Slots\n      - JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot\n      - JG219A HP 5820AF-24XG Switch\n      - JG219B HP 5820AF-24XG Switch\n      - JC102A HP 5820-24XG-SFP+ Switch\n      - JC102B HP 5820-24XG-SFP+ Switch\n  + **5500 HI (Comware 5) - Version: R5501P17**\n    * HP Network Products\n      - JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots\n      - JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots\n      - JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots\n      - JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots\n      - JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots\n      - JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n      - JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n      - JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots\n  + **5500 EI (Comware 5) - Version: R2221P19**\n    * HP Network Products\n      - JD373A HP 5500-24G DC EI Switch\n      - JD374A HP 5500-24G-SFP EI Switch\n      - JD375A HP 5500-48G EI Switch\n      - JD376A HP 5500-48G-PoE EI Switch\n      - JD377A HP 5500-24G EI Switch\n      - JD378A HP 5500-24G-PoE EI Switch\n      - JD379A HP 5500-24G-SFP DC EI Switch\n      - JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots\n      - JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots\n      - JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface\n      - JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots\n      - JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots\n      - JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n      - JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n  + **4800G (Comware 5) - Version: R2221P19**\n    * HP Network Products\n      - JD007A HP 4800-24G Switch\n      - JD008A HP 4800-24G-PoE Switch\n      - JD009A HP 4800-24G-SFP Switch\n      - JD010A HP 4800-48G Switch\n      - JD011A HP 4800-48G-PoE Switch\n  + **5500SI (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JD369A HP 5500-24G SI Switch\n      - JD370A HP 5500-48G SI Switch\n      - JD371A HP 5500-24G-PoE SI Switch\n      - JD372A HP 5500-48G-PoE SI Switch\n      - JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots\n      - JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots\n  + **4500G (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JF428A HP 4510-48G Switch\n      - JF847A HP 4510-24G Switch\n  + **5120 EI (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JE066A HP 5120-24G EI Switch\n      - JE067A HP 5120-48G EI Switch\n      - JE068A HP 5120-24G EI Switch with 2 Interface Slots\n      - JE069A HP 5120-48G EI Switch with 2 Interface Slots\n      - JE070A HP 5120-24G-PoE EI 2-slot Switch\n      - JE071A HP 5120-48G-PoE EI 2-slot Switch\n      - JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots\n      - JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots\n      - JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots\n      - JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots\n      - JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots\n      - JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots\n  + **4210G (Comware 5) - Version: R2221P20**\n    * HP Network Products\n      - JF844A HP 4210-24G Switch\n      - JF845A HP 4210-48G Switch\n      - JF846A HP 4210-24G-PoE Switch\n  + **5120 SI (Comware 5) - Version: R1516**\n    * HP Network Products\n      - JE072A HP 5120-48G SI Switch\n      - JE072B HPE 5120 48G SI Switch\n      - JE073A HP 5120-16G SI Switch\n      - JE073B HPE 5120 16G SI Switch\n      - JE074A HP 5120-24G SI Switch\n      - JE074B HPE 5120 24G SI Switch\n      - JG091A HP 5120-24G-PoE+ (370W) SI Switch\n      - JG091B HPE 5120 24G PoE+ (370W) SI Switch\n      - JG092A HP 5120-24G-PoE+ (170W) SI Switch\n      - JG309B HPE 5120 8G PoE+ (180W) SI Switch\n      - JG310B HPE 5120 8G PoE+ (65W) SI Switch\n  + **3610 (Comware 5) - Version: R5319P14**\n    * HP Network Products\n      - JD335A HP 3610-48 Switch\n      - JD336A HP 3610-24-4G-SFP Switch\n      - JD337A HP 3610-24-2G-2G-SFP Switch\n      - JD338A HP 3610-24-SFP Switch\n  + **3600V2 (Comware 5) - Version: R2110P06**\n    * HP Network Products\n      - JG299A HP 3600-24 v2 EI Switch\n      - JG299B HP 3600-24 v2 EI Switch\n      - JG300A HP 3600-48 v2 EI Switch\n      - JG300B HP 3600-48 v2 EI Switch\n      - JG301A HP 3600-24-PoE+ v2 EI Switch\n      - JG301B HP 3600-24-PoE+ v2 EI Switch\n      - JG301C HP 3600-24-PoE+ v2 EI Switch\n      - JG302A HP 3600-48-PoE+ v2 EI Switch\n      - JG302B HP 3600-48-PoE+ v2 EI Switch\n      - JG302C HP 3600-48-PoE+ v2 EI Switch\n      - JG303A HP 3600-24-SFP v2 EI Switch\n      - JG303B HP 3600-24-SFP v2 EI Switch\n      - JG304A HP 3600-24 v2 SI Switch\n      - JG304B HP 3600-24 v2 SI Switch\n      - JG305A HP 3600-48 v2 SI Switch\n      - JG305B HP 3600-48 v2 SI Switch\n      - JG306A HP 3600-24-PoE+ v2 SI Switch\n      - JG306B HP 3600-24-PoE+ v2 SI Switch\n      - JG306C HP 3600-24-PoE+ v2 SI Switch\n      - JG307A HP 3600-48-PoE+ v2 SI Switch\n      - JG307B HP 3600-48-PoE+ v2 SI Switch\n      - JG307C HP 3600-48-PoE+ v2 SI Switch\n  + **3100V2-48 (Comware 5) - Version: R2110P06**\n    * HP Network Products\n      - JG315A HP 3100-48 v2 Switch\n      - JG315B HP 3100-48 v2 Switch\n  + **HP870 (Comware 5) - Version: R2607P46**\n    * HP Network Products\n      - JG723A HP 870 Unified Wired-WLAN Appliance\n      - JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance\n  + **HP850 (Comware 5) - Version: R2607P46**\n    * HP Network Products\n      - JG722A HP 850 Unified Wired-WLAN Appliance\n      - JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance\n  + **HP830 (Comware 5) - Version: R3507P46**\n    * HP Network Products\n      - JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch\n      - JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch\n      - JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch\n      - JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant\n  + **HP6000 (Comware 5) - Version: R2507P46**\n    * HP Network Products\n      - JG639A HP 10500/7500 20G Unified Wired-WLAN Module\n      - JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module\n  + **WX5004-EI (Comware 5) - Version: R2507P46**\n    * HP Network Products\n      - JD447B HP WX5002 Access Controller\n      - JD448A HP WX5004 Access Controller\n      - JD448B HP WX5004 Access Controller\n      - JD469A HP WX5004 Access Controller\n  + **SecBlade FW (Comware 5) - Version: R3181P07**\n    * HP Network Products\n      - JC635A HP 12500 VPN Firewall Module\n      - JD245A HP 9500 VPN Firewall Module\n      - JD249A HP 10500/7500 Advanced VPN Firewall Module\n      - JD250A HP 6600 Firewall Processing Router Module\n      - JD251A HP 8800 Firewall Processing Module\n      - JD255A HP 5820 VPN Firewall Module\n  + **F1000-E (Comware 5) - Version: R3181P07**\n    * HP Network Products\n      - JD272A HP F1000-E VPN Firewall Appliance\n  + **F1000-A-EI (Comware 5) - Version: R3734P08**\n    * HP Network Products\n      - JG214A HP F1000-A-EI VPN Firewall Appliance\n  + **F1000-S-EI (Comware 5) - Version: R3734P08**\n    * HP Network Products\n      - JG213A HP F1000-S-EI VPN Firewall Appliance\n  + **F5000-A (Comware 5) - Version: F3210P26**\n    * HP Network Products\n      - JD259A HP A5000-A5 VPN Firewall Chassis\n      - JG215A HP F5000 Firewall Main Processing Unit\n      - JG216A HP F5000 Firewall Standalone Chassis\n  + **U200S and CS (Comware 5) - Version: F5123P33**\n    * HP Network Products\n      - JD273A HP U200-S UTM Appliance\n  + **U200A and M (Comware 5) - Version: F5123P33**\n    * HP Network Products\n      - JD275A HP U200-A UTM Appliance\n  + **F5000-C/S (Comware 5) - Version: R3811P05**\n    * HP Network Products\n      - JG650A HP F5000-C VPN Firewall Appliance\n      - JG370A HP F5000-S VPN Firewall Appliance\n  + **SecBlade III (Comware 5) - Version: R3820P06**\n    * HP Network Products\n      - JG371A HP 12500 20Gbps VPN Firewall Module\n      - JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module\n  + **6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n      - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n  + **6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC165A) HP 6600 RPE-X1 Router Module\n      - JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n  + **6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC176A) HP 6602 Router Chassis\n  + **HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JC177A HP 6608 Router\n      - JC177B HP 6608 Router Chassis\n      - JC178A HP 6604 Router Chassis\n      - JC178B HP 6604 Router Chassis\n      - JC496A HP 6616 Router Chassis\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n      - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n      - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n  + **HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n  + **SMB1910 (Comware 5) - Version: R1111**\n    * HP Network Products\n      - JG540A HP 1910-48 Switch\n      - JG539A HP 1910-24-PoE+ Switch\n      - JG538A HP 1910-24 Switch\n      - JG537A HP 1910-8 -PoE+ Switch\n      - JG536A HP 1910-8 Switch\n  + **SMB1920 (Comware 5) - Version: R1109**\n    * HP Network Products\n      - JG928A HP 1920-48G-PoE+ (370W) Switch\n      - JG927A HP 1920-48G Switch\n      - JG926A HP 1920-24G-PoE+ (370W) Switch\n      - JG925A HP 1920-24G-PoE+ (180W) Switch\n      - JG924A HP 1920-24G Switch\n      - JG923A HP 1920-16G Switch\n      - JG922A HP 1920-8G-PoE+ (180W) Switch\n      - JG921A HP 1920-8G-PoE+ (65W) Switch\n      - JG920A HP 1920-8G Switch\n  + **V1910 (Comware 5) - Version: R1516**\n    * HP Network Products\n      - JE005A HP 1910-16G Switch\n      - JE006A HP 1910-24G Switch\n      - JE007A HP 1910-24G-PoE (365W) Switch\n      - JE008A HP 1910-24G-PoE(170W) Switch\n      - JE009A HP 1910-48G Switch\n      - JG348A HP 1910-8G Switch\n      - JG349A HP 1910-8G-PoE+ (65W) Switch\n      - JG350A HP 1910-8G-PoE+ (180W) Switch\n  + **SMB 1620 (Comware 5) - Version: R1108**\n    * HP Network Products\n      - JG914A HP 1620-48G Switch\n      - JG913A HP 1620-24G Switch\n      - JG912A HP 1620-8G Switch\n\n**COMWARE 7 Products**\n\n  + **12500 (Comware 7) - Version: R7376**\n    * HP Network Products\n      - JC072B HP 12500 Main Processing Unit\n      - JC085A HP A12518 Switch Chassis\n      - JC086A HP A12508 Switch Chassis\n      - JC652A HP 12508 DC Switch Chassis\n      - JC653A HP 12518 DC Switch Chassis\n      - JC654A HP 12504 AC Switch Chassis\n      - JC655A HP 12504 DC Switch Chassis\n      - JF430A HP A12518 Switch Chassis\n      - JF430B HP 12518 Switch Chassis\n      - JF430C HP 12518 AC Switch Chassis\n      - JF431A HP A12508 Switch Chassis\n      - JF431B HP 12508 Switch Chassis\n      - JF431C HP 12508 AC Switch Chassis\n      - JG497A HP 12500 MPU w/Comware V7 OS\n      - JG782A HP FF 12508E AC Switch Chassis\n      - JG783A HP FF 12508E DC Switch Chassis\n      - JG784A HP FF 12518E AC Switch Chassis\n      - JG785A HP FF 12518E DC Switch Chassis\n      - JG802A HP FF 12500E MPU\n  + **10500 (Comware 7) - Version: R7170**\n    * HP Network Products\n      - JC611A HP 10508-V Switch Chassis\n      - JC612A HP 10508 Switch Chassis\n      - JC613A HP 10504 Switch Chassis\n      - JC748A HP 10512 Switch Chassis\n      - JG608A HP FlexFabric 11908-V Switch Chassis\n      - JG609A HP FlexFabric 11900 Main Processing Unit\n      - JG820A HP 10504 TAA Switch Chassis\n      - JG821A HP 10508 TAA Switch Chassis\n      - JG822A HP 10508-V TAA Switch Chassis\n      - JG823A HP 10512 TAA Switch Chassis\n      - JG496A HP 10500 Type A MPU w/Comware v7 OS\n      - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n      - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System\nMain Processing Unit\n  + **12900 (Comware 7) - Version: R1138P01**\n    * HP Network Products\n      - JG619A HP FlexFabric 12910 Switch AC Chassis\n      - JG621A HP FlexFabric 12910 Main Processing Unit\n      - JG632A HP FlexFabric 12916 Switch AC Chassis\n      - JG634A HP FlexFabric 12916 Main Processing Unit\n      - JH104A HP FlexFabric 12900E Main Processing Unit\n      - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n      - JH263A HP FlexFabric 12904E Main Processing Unit\n      - JH255A HP FlexFabric 12908E Switch Chassis\n      - JH262A HP FlexFabric 12904E Switch Chassis\n      - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n      - JH103A HP FlexFabric 12916E Switch Chassis\n  + **5900 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JC772A HP 5900AF-48XG-4QSFP+ Switch\n      - JG296A HP 5920AF-24XG Switch\n      - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n      - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n      - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n      - JG555A HP 5920AF-24XG TAA Switch\n      - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n      - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n      - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n      - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n  + **MSR1000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG875A HP MSR1002-4 AC Router\n      - JH060A HP MSR1003-8S AC Router\n  + **MSR2000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG411A HP MSR2003 AC Router\n      - JG734A HP MSR2004-24 AC Router\n      - JG735A HP MSR2004-48 Router\n      - JG866A HP MSR2003 TAA-compliant AC Router\n  + **MSR3000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG404A HP MSR3064 Router\n      - JG405A HP MSR3044 Router\n      - JG406A HP MSR3024 AC Router\n      - JG407A HP MSR3024 DC Router\n      - JG408A HP MSR3024 PoE Router\n      - JG409A HP MSR3012 AC Router\n      - JG410A HP MSR3012 DC Router\n      - JG861A HP MSR3024 TAA-compliant AC Router\n  + **MSR4000 (Comware 7) - Version: R0305P04**\n    * HP Network Products\n      - JG402A HP MSR4080 Router Chassis\n      - JG403A HP MSR4060 Router Chassis\n      - JG412A HP MSR4000 MPU-100 Main Processing Unit\n      - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n  + **VSR (Comware 7) - Version: E0321P01**\n    * HP Network Products\n      - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n      - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n      - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n      - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n  + **7900 (Comware 7) - Version: R2138P01**\n    * HP Network Products\n      - JG682A HP FlexFabric 7904 Switch Chassis\n      - JG841A HP FlexFabric 7910 Switch Chassis\n      - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n      - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n      - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n      - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n      - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n      - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n  + **5130 (Comware 7) - Version: R3109P16**\n    * HP Network Products\n      - JG932A HP 5130-24G-4SFP+ EI Switch\n      - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n      - JG934A HP 5130-48G-4SFP+ EI Switch\n      - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n      - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n      - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n      - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n      - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n      - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n      - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n      - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n  + **5700 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n      - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n      - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n      - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n      - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n      - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n  + **5930 (Comware 7) - Version: R2422P01**\n    * HP Network Products\n      - JG726A HP FlexFabric 5930 32QSFP+ Switch\n      - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n      - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n      - JH179A HP FlexFabric 5930 4-slot Switch\n      - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n      - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n  + **HSR6600 (Comware 7) - Version: R7103P05**\n    * HP Network Products\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n  + **HSR6800 (Comware 7) - Version: R7103P05**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing\n      - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit\n  + **1950 (Comware 7) - Version: R3109P16**\n    * HP Network Products\n      - JG960A HP 1950-24G-4XG Switch\n      - JG961A HP 1950-48G-2SFP+-2XGT Switch\n      - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch\n      - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch\n  + **7500 (Comware 7) - Version: R7170**\n    * HP Network Products\n      - JD238C HP 7510 Switch Chassis\n      - JD239C HP 7506 Switch Chassis\n      - JD240C HP 7503 Switch Chassis\n      - JD242C HP 7502 Switch Chassis\n      - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only\nMain Processing Unit\n      - JH208A HP 7502 Main Processing Unit\n      - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port\n40GbE QSFP+ Main Processing Unit\n\n**iMC Products**\n\n  + **iMC Plat - Version: iMC Plat 7.1 E0303P16**\n    * HP Network Products\n      - JD125A  HP IMC Std S/W Platform w/100-node\n      - JD126A  HP IMC Ent S/W Platform w/100-node\n      - JD808A  HP IMC Ent Platform w/100-node License\n      - JD814A   HP A-IMC Enterprise Edition Software DVD Media\n      - JD815A  HP IMC Std Platform w/100-node License\n      - JD816A  HP A-IMC Standard Edition Software DVD Media\n      - JF288AAE  HP Network Director to Intelligent Management Center\nUpgrade E-LTU\n      - JF289AAE  HP Enterprise Management System to Intelligent Management\nCenter Upgrade E-LTU\n      - JF377A  HP IMC Std S/W Platform w/100-node Lic\n      - JF377AAE  HP IMC Std S/W Pltfrm w/100-node E-LTU\n      - JF378A  HP IMC Ent S/W Platform w/200-node Lic\n      - JF378AAE  HP IMC Ent S/W Pltfrm w/200-node E-LTU\n      - JG546AAE  HP IMC Basic SW Platform w/50-node E-LTU\n      - JG548AAE  HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\n      - JG549AAE  HP PCM+ to IMC Std Upgr w/200-node E-LTU\n      - JG550AAE  HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU\n      - JG590AAE  HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU\n      - JG659AAE  HP IMC Smart Connect VAE E-LTU\n      - JG660AAE  HP IMC Smart Connect w/WLM VAE E-LTU\n      - JG747AAE  HP IMC Std SW Plat w/ 50 Nodes E-LTU\n      - JG748AAE  HP IMC Ent SW Plat w/ 50 Nodes E-LTU\n      - JG766AAE  HP IMC SmCnct Vrtl Applnc SW E-LTU\n      - JG767AAE  HP IMC SmCnct WSM Vrtl Applnc SW E-LTU\n      - JG768AAE  HP PCM+ to IMC Std Upg w/ 200-node E-LTU\n  + **iMC iNode - Version: iNode PC 7.1 E0313, or, iNode PC 7.2 (E0401)**\n    * HP Network Products\n      - JD144A HP A-IMC User Access Management Software Module with 200-user\nLicense\n      - JD147A HP IMC Endpoint Admission Defense Software Module with\n200-user License\n      - JD435A HP A-IMC Endpoint Admission Defense Client Software\n      - JF388A HP IMC User Authentication Management Software Module with\n200-user License\n      - JF388AAE HP IMC User Authentication Management Software Module with\n200-user E-LTU\n      - JF391A HP IMC Endpoint Admission Defense Software Module with\n200-user License\n      - JF391AAE HP IMC Endpoint Admission Defense Software Module with\n200-user E-LTU\n      - JG752AAE HP IMC User Access Manager Software Module with 50-user\nE-LTU\n      - JG754AAE) HP IMC Endpoint Admission Defense Software Module with\n50-user E-LTU\n  + **iMC TAM_UAM - Version: iMC UAM_TAM 7.1 (E0307)**\n    * HP Network Products\n      - JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE\n      - JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU\n      - JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU\n      - JG483A HP IMC TAM S/W MODULE W/100-NODE LIC\n      - JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU\n      - JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU\n  + **iMC NSM - Version: iMC WSM 7.1 E0303P10**\n    * HP Network Products\n      - JD456A HP IMC WSM Software Module with 50-Access Point License\n      - JF414A HP IMC Wireless Service Manager Software Module with 50-Access\nPoint License\n      - JF414AAE HP IMC Wireless Service Manager Software Module with\n50-Access Point E-LTU\n      - JG551AAE HP PCM+ Mobility Manager to IMC Wireless Service Manager\nModule Upgrade with 250 Access Point E-LTU\n      - JG758AAE HP IMC WSM/RTLS w/ 50-node E-LTU\n      - JG769AAE HP PCM Mobility Manager to IMC Wireless Service Manager Upg\nwith 250-node E-LTU\n\n**VCX Products**\n\n  + **VCX - Version: 9.8.18**\n    * HP Network Products\n      - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr\n      - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr\n      - JC517A HP VCX V7205 Platform w/DL 360 G6 Server\n      -  JE355A HP VCX V6000 Branch Platform 9.0\n      - JC516A HP VCX V7005 Platform w/DL 120 G6 Server\n      - JC518A HP VCX Connect 200 Primry 120 G6 Server\n      - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr\n      - JE341A HP VCX Connect 100 Secondary\n      - JE252A HP VCX Connect Primary MIM Module\n      - JE253A HP VCX Connect Secondary MIM Module\n      - JE254A HP VCX Branch MIM Module\n      - JE355A HP VCX V6000 Branch Platform 9.0\n      - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod\n      - JD023A HP MSR30-40 Router with VCX MIM Module\n      - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM\n      - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod\n      - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod\n      - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod\n      - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS\n      - JE340A HP VCX Connect 100 Pri Server 9.0\n      - JE342A HP VCX Connect 100 Sec Server 9.0\n\nHISTORY\nVersion:1 (rev.1) - 5 July 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability with any HPE supported\nproduct, send Email to: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-15:10.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          Multiple OpenSSL vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2015-06-12\nAffects:        All supported versions of FreeBSD. \nCorrected:      2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE)\n                2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12)\n                2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE)\n                2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16)\n                2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE)\n                2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30)\nCVE Name:       CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791\n                CVE-2015-1792, CVE-2015-4000\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:https://security.FreeBSD.org/>. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nII. [CVE-2015-1791]\n\nThe OpenSSL advisory also describes a problem that is identified as\nCVE-2014-8176, which is already fixed by an earlier FreeBSD Errata\nNotice, FreeBSD-EN-15:02.openssl. \n\nIII. [CVE-2015-4000]. \n[CVE-2015-1788].  This affects FreeBSD 10.1 only, as the problem\nwas no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]\n\nAn attacker may be able to crash multi-thread applications that\nsupports resumed TLS handshakes. [CVE-2015-1791]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc\n# gpg --verify openssl-10.1.patch.asc\n\n[FreeBSD 9.3 and 8.4]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r284286\nreleng/8.4/                                                       r284295\nstable/9/                                                         r284286\nreleng/9.3/                                                       r284295\nstable/10/                                                        r284285\nreleng/10.1/                                                      r284295\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:https://www.openssl.org/news/secadv_20150611.txt>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788> \n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>\n\nThe latest revision of this advisory is available at\n<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:10.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.4 (FreeBSD)\n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\nvVCM4Nyx4S9WDFOi76ug\n=dyhg\n-----END PGP SIGNATURE-----\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1n-i486-1_slack14.1.txz:  Upgraded. \n  Fixes several bugs and security issues:\n   o Malformed ECParameters causes infinite loop (CVE-2015-1788)\n   o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n   o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n   o CMS verify infinite loop with unknown hash function (CVE-2015-1792)\n   o Race condition handling NewSessionTicket (CVE-2015-1791)\n  For more information, see:\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791\n  (* Security fix *)\npatches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz:  Upgraded. \n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n383ecfed6bfef1440a44d7082745848a  openssl-0.9.8zg-i486-1_slack13.0.txz\nfb186187ffa200e22d9450a9d0e321f6  openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\neb52318ed52fef726402f0b2a74745c5  openssl-0.9.8zg-x86_64-1_slack13.0.txz\n9447927b960a01b21149e28a9783021f  openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n37f46f6b4fe2acbe217eaf7c0b33b704  openssl-0.9.8zg-i486-1_slack13.1.txz\n986de2e71676f61d788a59a1e0c8de1f  openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n6b160ce817dcde3ae5b3a861b284387b  openssl-0.9.8zg-x86_64-1_slack13.1.txz\n503d891680c711162386ea7e3daadca8  openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n5e7501b1d73d01d3d87704c3cfd3a888  openssl-0.9.8zg-i486-1_slack13.37.txz\n874f0b59870dd3f259640c9930a02f99  openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\nb6d91614458040d461dff3c3eab45206  openssl-0.9.8zg-x86_64-1_slack13.37.txz\nbe106df5e59c2be7fa442df8ba85ad0b  openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nee7c3937e6a6d7ac7537f751af7da7b9  openssl-1.0.1n-i486-1_slack14.0.txz\n758662437d33f99ec0a686cedeb1919e  openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n2dfdc4729e93cf460018e9e30a6223dc  openssl-1.0.1n-x86_64-1_slack14.0.txz\n9cb4b34e97e60f6bfe4c843aabeae954  openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n5a9bf08d55615cfc097109c2e3786f7b  openssl-1.0.1n-i486-1_slack14.1.txz\nfb1c05468e5c38d51a8ff6ac435e3a20  openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\n1ef5cede3f954c3e4741012ffa76b750  openssl-1.0.1n-x86_64-1_slack14.1.txz\nea22c288c60ae1d7ea8c5b3a1608462b  openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n56db8712d653c060f910e8915a8f8656  a/openssl-solibs-1.0.1n-i586-1.txz\n6d6264c9943e27240db5c8f5ec342e27  n/openssl-1.0.1n-i586-1.txz\n\nSlackware x86_64 -current packages:\ne73f7aff5aa0ad14bc06428544f99ae2  a/openssl-solibs-1.0.1n-x86_64-1.txz\n91b550b9eb0ac0c580e158375a93c0e4  n/openssl-1.0.1n-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. \n\nPlease download the latest version of HPE Version Control Repository Manager\n(VCRM) (7.5.1) from the following location:\n\nVCRM for Windows:\n\nhttps://www.hp.com/swpublishing/MTX-b59b11be53744759a650eadeb4\n\nVCRM for Linux is only available only with HPE Systems Insight Manager (HPE\nSIM):\n\nhttps://www.hp.com/go/sim\n\nHISTORY\nVersion:1 (rev.1) - 12 May 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
         {
            db: "BID",
            id: "75158",
         },
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-1788",
            trust: 2.2,
         },
         {
            db: "JUNIPER",
            id: "JSA10694",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "75158",
            trust: 1.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.1,
         },
         {
            db: "BID",
            id: "91787",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1032564",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10122",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-1788",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169629",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132260",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137772",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132288",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132285",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136989",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            db: "BID",
            id: "75158",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   id: "VAR-201506-0231",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.27443620166666666,
   },
   last_update_date: "2024-11-27T20:21:15.102000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/",
         },
         {
            title: "Red Hat: CVE-2015-1788",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1788",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2639-1",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20150611' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-07",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150612-openssl",
         },
         {
            title: "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/aravindb26/new.txt ",
         },
         {
            title: "afl-cve",
            trust: 0.1,
            url: "https://github.com/mrash/afl-cve ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.5,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            trust: 1.4,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10694",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl",
         },
         {
            trust: 1.4,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/75158",
         },
         {
            trust: 1.2,
            url: "https://security.gentoo.org/glsa/201506-02",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-2639-1",
         },
         {
            trust: 1.1,
            url: "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/kb/ht205031",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/91787",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            trust: 1.1,
            url: "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "https://openssl.org/news/secadv/20150611.txt",
         },
         {
            trust: 1.1,
            url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041",
         },
         {
            trust: 1.1,
            url: "https://bto.bluecoat.com/security-advisory/sa98",
         },
         {
            trust: 1.1,
            url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.1,
            url: "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10122",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1032564",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2015/dsa-3287",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963362",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962775",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965845",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/13",
         },
         {
            trust: 0.3,
            url: "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/135",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005376",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962520",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963954",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966723",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022797",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098801",
         },
         {
            trust: 0.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-15-014/",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962047",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962550",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964241",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962039",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962833",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022647",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961800",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963096",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961111",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960713",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964033",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964441",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903425",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960157",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961179",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962623",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959518",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961569",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005373",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005434",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960041",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960045",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961565",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961837",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962714",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962890",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964766",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966356",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966481",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966484",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966847",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966873",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21967146",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968871",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21969177",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21969271",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970020",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970667",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21971238",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21972125",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21974116",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000137",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21978471",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966381",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022618",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005364",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965643",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.3,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.3,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2639-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=43094",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3286",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1793",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?doci",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20150611.txt>",
         },
         {
            trust: 0.1,
            url: "https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4000>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-15:10.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "https://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/swpublishing/mtx-b59b11be53744759a650eadeb4",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/sim",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            db: "BID",
            id: "75158",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            db: "BID",
            id: "75158",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-06-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            date: "2015-06-11T00:00:00",
            db: "BID",
            id: "75158",
         },
         {
            date: "2015-06-11T12:12:12",
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            date: "2015-06-22T14:14:00",
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            date: "2015-06-11T23:39:03",
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            date: "2016-07-05T18:18:00",
            db: "PACKETSTORM",
            id: "137772",
         },
         {
            date: "2015-06-12T13:25:28",
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            date: "2015-06-12T13:17:58",
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            date: "2016-05-13T16:14:13",
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2015-06-12T19:59:01.600000",
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-12-13T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1788",
         },
         {
            date: "2018-10-08T08:00:00",
            db: "BID",
            id: "75158",
         },
         {
            date: "2024-11-21T02:26:08.177000",
            db: "NVD",
            id: "CVE-2015-1788",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "75158",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL CVE-2015-1788 Denial of Service Vulnerability",
      sources: [
         {
            db: "BID",
            id: "75158",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "75158",
         },
      ],
      trust: 0.3,
   },
}

var-201404-0008
Vulnerability from variot

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment. OpenSSL is prone to a remote memory-corruption vulnerability. An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible; however, this has not been confirmed.

Release Date: 2014-07-23 Last Updated: 2014-07-23

Potential Security Impact: Remote denial of service (DoS), code execution, unauthorized access, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control server migration running on Linux and Windows which could be exploited remotely resulting in denial of service (DoS), code execution, unauthorized access, or disclosure of information.

References:

CVE-2010-5298 Remote Denial of Service CVE-2014-0076 Unauthorized Disclosure of Information CVE-2014-0195 Remote Unauthorized Access CVE-2014-0198 Remote Denial of Service CVE-2014-0221 Remote Denial of Service (DoS) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information CVE-2014-3470 Remote Code Execution or Unauthorized Access SSRT101647

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server migration v7.2.2, v7.3, v7.3.1, and v7.3.2

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to v7.3.2 of HP Insight Control server migration to resolve these vulnerabilities by upgrading to version 7.3.3. Please note that version 7.3.3 of HP Insight Control server migration is included on the HP Insight Management 7.3 Update 2 DVD.

HP has provided the installation binaries for download from the following web site by using the Receive for free option:

http://h18013.www1.hp.com/products/servers/management/fpdownload.html

Customers using HP Insight Control server migration v7.2.2 must first upgrade from v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then upgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD.

Customers running HP Insight Control server migration v7.3, v7.3.1, or v7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to complete the upgrade.

For more information on the upgrade process, please refer to the HP Insight Management Installation and Upgrade Guide and Release notes, which are available at the following location:

http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind ex.aspx?cat=insightmanagement

NOTE: The upgrade paths described above update the entire HP Insight Control software stack. To upgrade HP Insight Control server migration only, complete the following steps:

Copy "hpsmp.exe" to the local machine from the HP Insight Management v7.3.0 Update 2 DVD ISO. Create batch file with the following commands: @echo off hpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch Copy the batch file to the folder where "hpsmp.exe" normally resides on the target system. Double click on the batch file. The HP Insight Control server migration installation starts in a command prompt. The command prompt closes when the installation finishes. After the installation completes it creates a log file (ICmigr.log) and an output file (ICmigroutput.xml) on the target system. Do not close or click on the command prompt while the process is completing. Do not run the command prompt in the background.

HISTORY Version:1 (rev.1) - 23 July 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlPPv38ACgkQ4B86/C0qfVmWsACgvg3ZBSYc1uQDUvMq71r7LLsR ZUUAnjwnaUdNhtgUmVoIOUaKjKyQIHsM =pNB+ -----END PGP SIGNATURE----- . HP System Management Homepage versions 7.3.2 and earlier for Linux and Windows. HP System Management Homepage v7.2.4.1 is available for Windows 2003 only.

HP System Management Homepage v7.2.4.1 for Windows x86: http://www.hp.com/swpublishing/MTX-d775367b0a28449ca05660778b ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98702

HP System Management Homepage v7.2.4.1 for Windows x64: http://www.hp.com/swpublishing/MTX-3a7aa5e233904ebe847a5e1555 ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98704

HP System Management Homepage v7.3.3.1 for Windows x86: http://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05 ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98696

HP System Management Homepage v7.3.3.1 for Windows x64: http://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba ftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98698

HP System Management Homepage v7.3.3.1 for Linux x86: http://www.hp.com/swpublishing/MTX-511c3e0b2f6f4f6bbc796fc619 ftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1980463820/v98694

HP System Management Homepage v7.3.3.1 for Linux x64: http://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93 ftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1507410135/v98693

NOTE: HP System Management Homepage v7.3.3.1 for Linux x86 still contains OpenSSL v1.0.0d. As long as all other products which SMH V7.3.3.1 for Linux x86 communicates with have been upgraded to the latest versions, it will not be vulnerable to the exploits described in CVE-2014-0224.

HP Systems Insight Manager v7.3 Hotfix kit HP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager v7.2 Hotfix kit is currently unavailable, but will be released at a later date.

http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

NOTE: No reboot of the system is required after applying the HP SIM Hotfix kit.

  • Go to the HP Software Depot site at http://www.software.hp.com and search for "HP OneView".

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue became relevant after the CVE-2014-3568 fix (CVE-2014-3569).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c (CVE-2014-8275).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).

The updated packages have been upgraded to the 1.0.1m version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS kz0ex6eI6hA6qSwklA2NoXY= =GYjX -----END PGP SIGNATURE----- . The following Common Vulnerabilities and Exposures project ids identify them:

CVE-2010-5298

A read buffer can be freed even when it still contains data that is

used later on, leading to a use-after-free.

CVE-2014-0076

ECDSA nonces can be recovered through the Yarom/Benger FLUSH+RELOAD

cache side-channel attack.

A third issue, with no CVE id, is the missing detection of the "critical" flag for the TSA extended key usage under certain cases.

Additionally, this update checks for more services that might need to be restarted after upgrades of libssl, corrects the detection of apache2 and postgresql, and adds support for the 'libraries/restart-without-asking' debconf configuration. This allows services to be restarted on upgrade without prompting.

The oldstable distribution (squeeze) is not affected by CVE-2010-5298 and it might be updated at a later time to address the remaining vulnerabilities.

For the testing distribution (jessie), these problems will be fixed soon.

We recommend that you upgrade your openssl packages. ============================================================================ Ubuntu Security Notice USN-2192-1 May 05, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary:

OpenSSL could be made to crash if it received specially crafted network traffic.

Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

It was discovered that OpenSSL incorrectly handled memory in the ssl3_read_bytes() function. (CVE-2010-5298)

It was discovered that OpenSSL incorrectly handled memory in the do_ssl3_write() function. (CVE-2014-0198)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.1

Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.3

Ubuntu 12.10: libssl1.0.0 1.0.1c-3ubuntu2.8

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.13

After a standard system update you need to reboot your computer to make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2192-1 CVE-2010-5298, CVE-2014-0198

Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.1 https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.3 https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.8 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.13

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0008",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "linux enterprise workstation extension",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "linux enterprise software development kit",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ssl vpn 8.0r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8.106",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58200",
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 13.1r4-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 12.1r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.5",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.2.12",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "cp1543-1",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "junos 12.1r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "60000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.2",
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "junos 12.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v2-480",
         },
         {
            model: "junos 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 11.4r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "uacos c4.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msr3000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.4",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.3",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.2",
         },
         {
            model: "m220 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "7775",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58300",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "4800g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "secure analytics 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "119000",
         },
         {
            model: "secure analytics 2014.2r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.12",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "junos 13.1r3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "10",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "oneview",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.10",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "f1000a and s family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "u200a and m family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "850/8700",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "junos 11.4r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "7765",
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "junos d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.3",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "hsr6602 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.5",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr93x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.0",
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wx5002/5004 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos 11.4r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "10.0-release-p2",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "a6600 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "junos 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vsr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.3r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "junos 12.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.2",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.8",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "14.1",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "junos 12.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 13.2r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos r7",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.9",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "msr20 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.1r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 11.4r10-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "junos 5.0r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129000",
         },
         {
            model: "fortios build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.2.10",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "hsr6800 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "ssl vpn 7.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.1",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.0",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "msr20 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.3.10",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "msr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "secblade iii",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "junos 10.4r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "junos 12.1r8-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "junos 13.2r5",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "junos 13.1r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "(comware family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12500v7)0",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4.0.15",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.2",
         },
         {
            model: "cp1543-1",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.1.25",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "secure analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr30 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "strm 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos os 12.1x47-d10",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "jsa 2014.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.2",
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7900.00",
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "f1000e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 12.2r9",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19200",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.3",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hsr6602 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.0",
         },
         {
            model: "msr93x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "secure analytics 2014.2r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "junos 13.3r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.6",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "junos 12.1r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "simatic s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "1.5.0",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "msr50 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.3",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "virusscan enterprise for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "1.7.1",
         },
         {
            model: "strm",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.4",
         },
         {
            model: "msr50 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "junos 12.1x45-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.5.0.15",
         },
         {
            model: "junos 13.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "junos 13.2r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "u200s and cs family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "security threat response manager 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.1",
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.3",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "hsr6800 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v5)0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.12",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "simatic s7-1500",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.6",
         },
         {
            model: "strm/jsa 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ngfw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.3",
         },
         {
            model: "junos 10.4r16",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msr9xx russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.3r4-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.203",
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr50-g2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "junos 5.0r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "11.16",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.2.13",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "virusscan enterprise for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "1.8",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "junos os 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uacos c5.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "webex messenger service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 13.1r.3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58000",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.7",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "junos os 12.1x46-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v20",
         },
         {
            model: "junos 12.1x45-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "uacos c5.0",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "7755",
         },
         {
            model: "strm/jsa",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "imc uam",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 10.4s",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v7)0",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 11.4r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.4",
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9500e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr30-16 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.2",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "simatic s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr20-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "virusscan enterprise for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "ape",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security threat response manager 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.6",
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "junos 12.1x45-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 10.4s15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "20",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.4",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "36100",
         },
         {
            model: "junos 13.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "hi switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "msr30-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.7",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "msr9xx family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "msr2000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "junos os 13.3r2-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msr30 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "junos 12.2r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "125000",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "msr30-16 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "imc ead",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.1",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3600v20",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "fortios b064",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "fortios",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "msr4000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.6",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "mcp russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.1",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.1",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "a6600 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos 12.1r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "f5000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19100",
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "junos 13.3r2-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos r11",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27.62",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos os 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "virusscan enterprise for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "1.9",
         },
         {
            model: "pk family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "junos os 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59200",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 11.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x45-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "4210g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "junos r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "14.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "webapp secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "junos 13.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45-",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cms r17ac.g",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59000",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "mcp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "75000",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8300",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "junos 12.2r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "secblade fw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos os 13.2r5",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "junos os 14.1r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "junos 10.4r15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uacos c4.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "p2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "junos 10.0s25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.2",
         },
         {
            model: "junos d10",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "msr50 g2 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "junos 10.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.3r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.1",
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.4",
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.0",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "blackberry link",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "1.2",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.05",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "msr20-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.107",
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "msr30-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "4510g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.2",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "junos 12.1r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos os 12.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "66801",
         },
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2010-5298",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "HIGH",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 4.9,
                  id: "CVE-2010-5298",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:H/Au:N/C:N/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2010-5298",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2010-5298",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment. OpenSSL is prone to a remote memory-corruption vulnerability. \nAn attacker can exploit this issue to cause denial-of-service condition. Due to the nature of  this issue,  arbitrary code execution may be possible; however, this has  not been  confirmed. \n\nRelease Date: 2014-07-23\nLast Updated: 2014-07-23\n\nPotential Security Impact: Remote denial of service (DoS), code execution,\nunauthorized access, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Insight\nControl server migration running on Linux and Windows which could be\nexploited remotely resulting in denial of service (DoS), code execution,\nunauthorized access, or disclosure of information. \n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service\nCVE-2014-0076 Unauthorized Disclosure of Information\nCVE-2014-0195 Remote Unauthorized Access\nCVE-2014-0198 Remote Denial of Service\nCVE-2014-0221 Remote Denial of Service (DoS)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nCVE-2014-3470 Remote Code Execution or Unauthorized Access\nSSRT101647\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control server migration v7.2.2, v7.3, v7.3.1, and v7.3.2\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to v7.3.2 of HP Insight Control server\nmigration to resolve these vulnerabilities by upgrading to version 7.3.3. \nPlease note that version 7.3.3 of HP Insight Control server migration is\nincluded on the HP Insight Management 7.3 Update 2 DVD. \n\nHP has provided the installation binaries for download from the following web\nsite by using the Receive for free option:\n\nhttp://h18013.www1.hp.com/products/servers/management/fpdownload.html\n\nCustomers using HP Insight Control server migration v7.2.2 must first upgrade\nfrom v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then\nupgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD. \n\nCustomers running HP Insight Control server migration v7.3, v7.3.1, or\nv7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to\ncomplete the upgrade. \n\nFor more information on the upgrade process, please refer to the HP Insight\nManagement Installation and Upgrade Guide and Release notes, which are\navailable at the following location:\n\nhttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind\nex.aspx?cat=insightmanagement\n\nNOTE: The upgrade paths described above update the entire HP Insight Control\nsoftware stack. To upgrade HP Insight Control server migration only, complete\nthe following steps:\n\nCopy \"hpsmp.exe\" to the local machine from the HP Insight Management v7.3.0\nUpdate 2 DVD ISO. Create batch file with the following commands:\n@echo off\nhpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch\nCopy the batch file to the folder where \"hpsmp.exe\" normally resides on the\ntarget system. \nDouble click on the batch file. \nThe HP Insight Control server migration installation starts in a command\nprompt. \nThe command prompt closes when the installation finishes. \nAfter the installation completes it creates a log file (ICmigr.log) and an\noutput file (ICmigroutput.xml) on the target system. \nDo not close or click on the command prompt while the process is completing. \nDo not run the command prompt in the background. \n\nHISTORY\nVersion:1 (rev.1) - 23 July 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlPPv38ACgkQ4B86/C0qfVmWsACgvg3ZBSYc1uQDUvMq71r7LLsR\nZUUAnjwnaUdNhtgUmVoIOUaKjKyQIHsM\n=pNB+\n-----END PGP SIGNATURE-----\n. \nHP System Management Homepage versions 7.3.2 and earlier for Linux and\nWindows. HP System Management Homepage v7.2.4.1 is available for\nWindows 2003 only. \n\nHP System Management Homepage v7.2.4.1 for Windows x86:\nhttp://www.hp.com/swpublishing/MTX-d775367b0a28449ca05660778b\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98702\n\nHP System Management Homepage v7.2.4.1 for Windows x64:\nhttp://www.hp.com/swpublishing/MTX-3a7aa5e233904ebe847a5e1555\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98704\n\nHP System Management Homepage v7.3.3.1 for Windows x86:\nhttp://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p11160892/v98696\n\nHP System Management Homepage v7.3.3.1 for Windows x64:\nhttp://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba\nftp://ftp.hp.com/pub/softlib2/software1/sc-windows/p221526337/v98698\n\nHP System Management Homepage v7.3.3.1 for Linux x86:\nhttp://www.hp.com/swpublishing/MTX-511c3e0b2f6f4f6bbc796fc619\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1980463820/v98694\n\nHP System Management Homepage v7.3.3.1 for Linux x64:\nhttp://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-linux/p1507410135/v98693\n\nNOTE: HP System Management Homepage v7.3.3.1 for Linux x86 still contains\nOpenSSL v1.0.0d. As long as all other products which SMH V7.3.3.1 for Linux\nx86 communicates with have been upgraded to the latest versions, it will not\nbe vulnerable to the exploits described in CVE-2014-0224. \n\nHP Systems Insight Manager v7.3 Hotfix kit\nHP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager\nv7.2 Hotfix kit is currently unavailable, but will be released at a later\ndate. \n\nhttp://h18013.www1.hp.com/products/servers/management/hpsim/download.html\n\nNOTE: No reboot of the system is required after applying the HP SIM Hotfix\nkit. \n\n - Go to the HP Software Depot site at http://www.software.hp.com and search\nfor \"HP OneView\". \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue\n became relevant after the CVE-2014-3568 fix (CVE-2014-3569). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k\n does not enforce certain constraints on certificate data, which allows\n remote attackers to defeat a fingerprint-based certificate-blacklist\n protection mechanism by including crafted data within a\n certificate&#039;s unsigned portion, related to crypto/asn1/a_verify.c,\n crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c\n (CVE-2014-8275). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n \n The updated packages have been upgraded to the 1.0.1m version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS\nkz0ex6eI6hA6qSwklA2NoXY=\n=GYjX\n-----END PGP SIGNATURE-----\n. The following\nCommon Vulnerabilities and Exposures project ids identify them:\n\nCVE-2010-5298\n\n    A read buffer can be freed even when it still contains data that is\nused later on, leading to a use-after-free. \n\nCVE-2014-0076\n\n    ECDSA nonces can be recovered through the Yarom/Benger FLUSH+RELOAD\ncache side-channel attack. \n\nA third issue, with no CVE id, is the missing detection of the\n\"critical\" flag for the TSA extended key usage under certain cases. \n\n\nAdditionally, this update checks for more services that might need to\nbe restarted after upgrades of libssl, corrects the detection of\napache2 and postgresql, and adds support for the\n'libraries/restart-without-asking' debconf configuration. This allows\nservices to be restarted on upgrade without prompting. \n\n\nThe oldstable distribution (squeeze) is not affected by CVE-2010-5298\nand it might be updated at a later time to address the remaining\nvulnerabilities. \n\nFor the testing distribution (jessie), these problems will be fixed\nsoon. \n\nWe recommend that you upgrade your openssl packages. ============================================================================\nUbuntu Security Notice USN-2192-1\nMay 05, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 13.10\n- Ubuntu 12.10\n- Ubuntu 12.04 LTS\n\nSummary:\n\nOpenSSL could be made to crash if it received specially crafted network\ntraffic. \n\nSoftware Description:\n- openssl: Secure Socket Layer (SSL) cryptographic library and tools\n\nDetails:\n\nIt was discovered that OpenSSL incorrectly handled memory in the\nssl3_read_bytes() function. \n(CVE-2010-5298)\n\nIt was discovered that OpenSSL incorrectly handled memory in the\ndo_ssl3_write() function. \n(CVE-2014-0198)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.1\n\nUbuntu 13.10:\n  libssl1.0.0                     1.0.1e-3ubuntu1.3\n\nUbuntu 12.10:\n  libssl1.0.0                     1.0.1c-3ubuntu2.8\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.13\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2192-1\n  CVE-2010-5298, CVE-2014-0198\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.1\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.3\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.8\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.13\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
         {
            db: "BID",
            id: "66801",
         },
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "126228",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126481",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2010-5298",
            trust: 2.4,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "66801",
            trust: 1.4,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59440",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59438",
            trust: 1.1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2014/04/13/1",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03G",
            trust: 0.4,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "JUNIPER",
            id: "JSA10643",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03F",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03B",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03C",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03D",
            trust: 0.3,
         },
         {
            db: "MCAFEE",
            id: "SB10071",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2010-5298",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127607",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127362",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127213",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127266",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127608",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127469",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126228",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127265",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126481",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            db: "BID",
            id: "66801",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "126228",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126481",
         },
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   id: "VAR-201404-0008",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.42320128826086945,
   },
   last_update_date: "2024-11-29T22:26:29.107000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/07/10/fireeye_patches_os_torpedo_exploitdb_disclosure/",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2192-1",
         },
         {
            title: "Debian Security Advisories: DSA-2908-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=438bf64e25a46a5ac11098b5720d1bb6",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0198 Null pointer dereference bug in OpenSSL 1.0.1g and earlier",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=94b6140bb563b66b3bcd98992e854bf3",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0076",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=1fc1fc75c3cab4aa04eb437a09a1da4f",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.4,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.4,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.4,
            url: "http://www.fortiguard.com/advisory/fg-ir-14-018/",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529",
         },
         {
            trust: 1.4,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 1.1,
            url: "http://openwall.com/lists/oss-security/2014/04/13/1",
         },
         {
            trust: 1.1,
            url: "http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup",
         },
         {
            trust: 1.1,
            url: "http://ftp.openbsd.org/pub/openbsd/patches/5.5/common/004_openssl.patch.sig",
         },
         {
            trust: 1.1,
            url: "http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse",
         },
         {
            trust: 1.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3265&user=guest&pass=guest",
         },
         {
            trust: 1.1,
            url: "http://www.openbsd.org/errata55.html#004_openssl",
         },
         {
            trust: 1.1,
            url: "https://rt.openssl.org/ticket/display.html?id=2167&user=guest&pass=guest",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/66801",
         },
         {
            trust: 1.1,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 1.1,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59438",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1.1,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:090",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59440",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29195",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.1,
            url: "http://advisories.mageia.org/mgasa-2014-0187.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.7,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03g",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/oss-sec/2014/q2/102",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list&showdraft=false",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2010_5298_race_conditions",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "http://www.freebsd.org/security/advisories/freebsd-sa-14:09.openssl.asc",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10643&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15328.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100180978",
         },
         {
            trust: 0.3,
            url: "http://ics-cert.us-cert.gov/advisories/icsa-14-198-03",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03d",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368264",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347622",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004830",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10071",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690128",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03b",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03c",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03f",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list",
         },
         {
            trust: 0.2,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-511c3e0b2f6f4f6bbc796fc619",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-bd9a1cf60e344c549c4888db93",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-3395d737d98f42149125b9bb05",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-3a7aa5e233904ebe847a5e1555",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-d775367b0a28449ca05660778b",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-e8076c2a35804685ad65b2b1ba",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/362.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=33860",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2192-1/",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/fpdownload.html",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-2c54f23c6dbc4d598e86fdef95",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-4480df0f6d544779b0143f5c3b",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://www.software.hp.com",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-8208c3987b1b4a5093f3e8fcc3",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-c0d32bac154a4d93839d8cd1f2",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-8aefeaf490284a7691eca97d13",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.13",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.3",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.8",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2192-1",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            db: "BID",
            id: "66801",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "126228",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126481",
         },
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            db: "BID",
            id: "66801",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "126228",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126481",
         },
         {
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-04-14T00:00:00",
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            date: "2014-04-13T00:00:00",
            db: "BID",
            id: "66801",
         },
         {
            date: "2014-07-24T23:47:46",
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            date: "2014-07-06T18:53:39",
            db: "PACKETSTORM",
            id: "127362",
         },
         {
            date: "2014-06-25T21:32:38",
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            date: "2014-06-27T18:43:56",
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            date: "2014-07-24T23:48:05",
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            date: "2014-07-15T23:58:24",
            db: "PACKETSTORM",
            id: "127469",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2014-04-21T19:46:40",
            db: "PACKETSTORM",
            id: "126228",
         },
         {
            date: "2014-06-27T18:43:23",
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            date: "2014-05-05T17:16:01",
            db: "PACKETSTORM",
            id: "126481",
         },
         {
            date: "2014-04-14T22:38:08.590000",
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2010-5298",
         },
         {
            date: "2017-05-23T16:24:00",
            db: "BID",
            id: "66801",
         },
         {
            date: "2022-08-29T20:53:02.917000",
            db: "NVD",
            id: "CVE-2010-5298",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "66801",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL 'ssl3_release_read_buffer()' Use-After-Free Memory Corruption Vulnerability",
      sources: [
         {
            db: "BID",
            id: "66801",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "66801",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0125
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors. Exploiting this issue could allow an attacker to execute arbitrary FTP commands in the context of the affected application. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0125",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "60995",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0476",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 6.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2013-0476",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 6.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-60478",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0476",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0476",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-052",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60478",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors. \nExploiting this issue could allow an  attacker to execute  arbitrary FTP commands in the context of the affected application. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "BID",
            id: "60995",
         },
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0476",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "81405",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60995",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60478",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            db: "BID",
            id: "60995",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   id: "VAR-201307-0125",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:50:23.328000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81405",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0476",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0476",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81405",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            db: "BID",
            id: "60995",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            db: "BID",
            id: "60995",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            date: "2013-07-05T00:00:00",
            db: "BID",
            id: "60995",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            date: "2013-07-03T13:54:30.983000",
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60478",
         },
         {
            date: "2013-07-05T00:00:00",
            db: "BID",
            id: "60995",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
         {
            date: "2017-08-29T01:33:02.997000",
            db: "NVD",
            id: "CVE-2013-0476",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway In any  FTP Command insertion vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003197",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-052",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0074
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0074",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60991",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60991",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-3020",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-3020",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-63022",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-3020",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-3020",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-063",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-63022",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "BID",
            id: "60991",
         },
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-3020",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "84359",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60991",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-63022",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            db: "BID",
            id: "60991",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   id: "VAR-201307-0074",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:34:01.440000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/84359",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3020",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3020",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/84359",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            db: "BID",
            id: "60991",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            db: "BID",
            id: "60991",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60991",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            date: "2013-07-03T13:54:31.103000",
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-63022",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60991",
         },
         {
            date: "2013-10-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
         {
            date: "2017-08-29T01:33:20.090000",
            db: "NVD",
            id: "CVE-2013-3020",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003209",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-063",
         },
      ],
      trust: 0.6,
   },
}

var-201804-0273
Vulnerability from variot

The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259. Vendors have confirmed this vulnerability IBM X-Force ID: 92259 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201804-0273",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
      ],
   },
   cve: "CVE-2014-0927",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-0927",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-68420",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  id: "CVE-2014-0927",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0927",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-0927",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201804-1312",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-68420",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259. Vendors have confirmed this vulnerability IBM X-Force ID: 92259 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0927",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-68420",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   id: "VAR-201804-0273",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:30:28.434000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1674739",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21674739",
         },
         {
            title: "ibm-sterling-cve20140927-sec-bypass (92259)",
            trust: 0.8,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92259",
         },
         {
            title: "IBM Sterling B2B Integrator  and IBM Sterling File Gateway Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79606",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21674739",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92259",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0927",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0927",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-04-20T00:00:00",
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            date: "2018-06-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            date: "2018-04-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            date: "2018-04-20T21:29:00.393000",
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-05-22T00:00:00",
            db: "VULHUB",
            id: "VHN-68420",
         },
         {
            date: "2018-06-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
         {
            date: "2018-04-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
         {
            date: "2024-11-21T02:03:03.430000",
            db: "NVD",
            id: "CVE-2014-0927",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  IBM Sterling File Gateway Authentication vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008596",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-1312",
         },
      ],
      trust: 0.6,
   },
}

var-201609-0596
Vulnerability from variot

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. Versions prior to OpenSSL 1.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2016:1940-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1940.html Issue date: 2016-09-27 CVE Names: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 =====================================================================

  1. Summary:

An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-2178)

  • It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181)

  • An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. (CVE-2016-2182)

  • A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)

This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.

  • An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. (CVE-2016-6302)

  • Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)

  • An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() 1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-1.0.1e-48.el6_8.3.ppc.rpm openssl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-1.0.1e-48.el6_8.3.s390.rpm openssl-1.0.1e-48.el6_8.3.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-devel-1.0.1e-48.el6_8.3.s390.rpm openssl-devel-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-static-1.0.1e-48.el6_8.3.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-perl-1.0.1e-48.el6_8.3.s390x.rpm openssl-static-1.0.1e-48.el6_8.3.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-48.el6_8.3.src.rpm

i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

ppc64: openssl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-1.0.1e-51.el7_2.7.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-devel-1.0.1e-51.el7_2.7.s390.rpm openssl-devel-1.0.1e-51.el7_2.7.s390x.rpm openssl-libs-1.0.1e-51.el7_2.7.s390.rpm openssl-libs-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-static-1.0.1e-51.el7_2.7.ppc.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64.rpm

ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm

s390x: openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-perl-1.0.1e-51.el7_2.7.s390x.rpm openssl-static-1.0.1e-51.el7_2.7.s390.rpm openssl-static-1.0.1e-51.el7_2.7.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-51.el7_2.7.src.rpm

x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-2179 https://access.redhat.com/security/cve/CVE-2016-2180 https://access.redhat.com/security/cve/CVE-2016-2181 https://access.redhat.com/security/cve/CVE-2016-2182 https://access.redhat.com/security/cve/CVE-2016-6302 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-6306 https://access.redhat.com/security/updates/classification/#important https://www.openssl.org/news/secadv/20160922.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI xpTW7ApBLmKhVjs49DGYouI= =4VgY -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Additional information can be found at https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/

CVE-2016-2178

Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
leak in the DSA code.

CVE-2016-2179 / CVE-2016-2181

Quan Luo and the OCAP audit team discovered denial of service
vulnerabilities in DTLS.

For the stable distribution (jessie), these problems have been fixed in version 1.0.1t-1+deb8u4.

For the unstable distribution (sid), these problems will be fixed soon. ========================================================================== Ubuntu Security Notice USN-3087-2 September 23, 2016

openssl regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

USN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was incomplete and caused a regression when parsing certificates. This update fixes the problem.

We apologize for the inconvenience. This issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178) Quan Luo discovered that OpenSSL did not properly restrict the lifetime of queue entries in the DTLS implementation. (CVE-2016-2181) Shi Lei discovered that OpenSSL incorrectly validated division results. (CVE-2016-2182) Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks. (CVE-2016-2183) Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303) Shi Lei discovered that OpenSSL incorrectly performed certain message length checks. (CVE-2016-6306)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.5

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.21

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.38

After a standard system update you need to reboot your computer to make all the necessary changes. OpenSSL Security Advisory [22 Sep 2016] ========================================

OCSP Status Request extension unbounded memory growth (CVE-2016-6304)

Severity: High

A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will eventually lead to a Denial Of Service attack through memory exhaustion. Servers with a default configuration are vulnerable even if they do not support OCSP. Builds using the "no-ocsp" build time option are not affected.

Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support.

OpenSSL 1.1.0 users should upgrade to 1.1.0a OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

SSL_peek() hang on empty record (CVE-2016-6305)

Severity: Moderate

OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an empty record. This could be exploited by a malicious peer in a Denial Of Service attack.

OpenSSL 1.1.0 users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The fix was developed by Matt Caswell of the OpenSSL development team.

SWEET32 Mitigation (CVE-2016-2183)

Severity: Low

SWEET32 (https://sweet32.info) is an attack on older block cipher algorithms that use a block size of 64 bits. In mitigation for the SWEET32 attack DES based ciphersuites have been moved from the HIGH cipherstring group to MEDIUM in OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had these ciphersuites disabled by default.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 16th August 2016 by Karthikeyan Bhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the OpenSSL development team.

OOB write in MDC2_Update() (CVE-2016-6303)

Severity: Low

An overflow can occur in MDC2_Update() either if called directly or through the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption.

The amount of data needed is comparable to SIZE_MAX which is impractical on most platforms.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Malformed SHA512 ticket DoS (CVE-2016-6302)

Severity: Low

If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a DoS attack where a malformed ticket will result in an OOB read which will ultimately crash.

The use of SHA512 in TLS session tickets is comparatively rare as it requires a custom server callback and ticket lookup mechanism.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB write in BN_bn2dec() (CVE-2016-2182)

Severity: Low

The function BN_bn2dec() does not check the return value of BN_div_word(). This can cause an OOB write if an application uses this function with an overly large BIGNUM. This could be a problem if an overly large certificate or CRL is printed out from an untrusted source. TLS is not affected because record limits will reject an oversized certificate before it is parsed.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

OOB read in TS_OBJ_print_bio() (CVE-2016-2180)

Severity: Low

The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is the total length the OID text representation would use and not the amount of data written. This will result in OOB reads when large OIDs are presented.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Pointer arithmetic undefined behaviour (CVE-2016-2177)

Severity: Low

Avoid some undefined pointer arithmetic

A common idiom in the codebase is to check limits in the following manner: "p + len > limit"

Where "p" points to some malloc'd data of SIZE bytes and limit == p + SIZE

"len" here could be from some externally supplied data (e.g. from a TLS message).

The rules of C pointer arithmetic are such that "p + len" is only well defined where len <= SIZE. Therefore the above idiom is actually undefined behaviour.

For example this could cause problems if some malloc implementation provides an address for "p" such that "p + len" actually overflows for values of len that are too big and therefore p + len < limit.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team.

Constant time flag not preserved in DSA signing (CVE-2016-2178)

Severity: Low

Operations in the DSA signing algorithm should run in constant time in order to avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that a non-constant time codepath is followed for certain operations. This has been demonstrated through a cache-timing attack to be sufficient for an attacker to recover the private DSA key.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by César Pereida.

DTLS buffered message DoS (CVE-2016-2179)

Severity: Low

In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed. An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simulataneous connections an attacker could cause a DoS attack through memory exhaustion.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was developed by Matt Caswell of the OpenSSL development team.

DTLS replay protection DoS (CVE-2016-2181)

Severity: Low

A flaw in the DTLS replay attack protection mechanism means that records that arrive for future epochs update the replay protection "window" before the MAC for the record has been validated. This could be exploited by an attacker by sending a record for the next epoch (which does not have to decrypt or have a valid MAC), with a very large sequence number. This means that all subsequent legitimate packets are dropped causing a denial of service for a specific DTLS connection.

OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. The fix was developed by Matt Caswell of the OpenSSL development team.

Certificate message OOB reads (CVE-2016-6306)

Severity: Low

In OpenSSL 1.0.2 and earlier some missing message length checks can result in OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical DoS risk but this has not been observed in practice on common platforms.

The messages affected are client certificate, client certificate request and server certificate. As a result the attack can only be performed against a client or a server which enables client authentication.

OpenSSL 1.1.0 is not affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2i OpenSSL 1.0.1 users should upgrade to 1.0.1u

This issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL development team.

Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)

Severity: Low

A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect DTLS users.

OpenSSL 1.1.0 TLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)

Severity: Low

This issue is very similar to CVE-2016-6307. The underlying defect is different but the security analysis and impacts are the same except that it impacts DTLS.

A DTLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion. However, the excessive message length check still takes place, and this would cause the connection to immediately fail. Assuming that the application calls SSL_free() on the failed conneciton in a timely manner then the 21Mb of allocated memory will then be immediately freed again. Therefore the excessive memory allocation will be transitory in nature. This then means that there is only a security impact if:

1) The application does not call SSL_free() in a timely manner in the event that the connection fails or 2) The application is working in a constrained environment where there is very little free memory or 3) The attacker initiates multiple connection attempts such that there are multiple connections in a state where memory has been allocated for the connection; SSL_free() has not yet been called; and there is insufficient memory to service the multiple requests.

Except in the instance of (1) above any Denial Of Service is likely to be transitory because as soon as the connection fails the memory is subsequently freed again in the SSL_free() call. However there is an increased risk during this period of application crashes due to the lack of memory - which would then mean a more serious Denial of Service.

This issue does not affect TLS users.

OpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a

This issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team, Qihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL development team.

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade.

Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv/20160922.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0596",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1q",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.1.0",
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0",
         },
         {
            model: "enterpriseidentitymanager",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "esmpro/serveragentservice",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "(linux edition )",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "sg3600 all series",
         },
         {
            model: "ix1000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.4",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.4",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard v8.2 to  v9.4",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "9",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "7",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "6",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "5",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "4",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "12",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "11",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.2",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "10",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.26",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.22",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.16",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.14",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.13",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.12",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.11",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.10",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.9",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.8",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.18",
         },
         {
            model: "vm virtualbox",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.3",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.9.15.9.8",
         },
         {
            model: "oss support tools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.8.15.7.15",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3.8",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.5",
         },
         {
            model: "mysql workbench",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1.4",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.15",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.14",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.13",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.12",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.9",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.8",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.7",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.6",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.5",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.4",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.3",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.33",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.32",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.31",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.30",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.28",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.27",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.26",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.25",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.24",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.23",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.22",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.21",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.17",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.12",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.11",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.10",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.9",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.6",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.11",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.7.10",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.8",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.7",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.5",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.4",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.29",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.20",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.2",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.19",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.18",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.16",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.15",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.14",
         },
         {
            model: "mysql",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.6.13",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.3.2",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.2",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.2.0.0",
         },
         {
            model: "enterprise manager base platform",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "13.1.0.0",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.3.0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1.2.0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.9.0",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.7.0",
         },
         {
            model: "api gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.2.4.0",
         },
         {
            model: "access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.4.3.0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.11",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl b-36.8",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.4",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.3",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.2",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.1",
         },
         {
            model: "project openssl 1.0.2i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl 1.0.1u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0x",
         },
         {
            model: "project openssl 1.0.0t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "project openssl 0.9.8zh",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8zg",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8zf",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8.",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.405",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.404",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.403",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.402",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.401",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.400",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.4",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.2",
         },
         {
            model: "email gateway 7.6.405h1165239",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "email gateway 7.6.405h1157986",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.2",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.1",
         },
         {
            model: "email gateway 7.6.2h968406",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.151.05",
         },
         {
            model: "tivoli provisioning manager for os deployment intirim fix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.133",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.3",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.116",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "tivoli provisioning manager for os deployment 5.1.fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.07",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.2",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20280.6",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.12",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "smartcloud entry appliance fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.4",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0.4",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.0",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0.4",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.0",
         },
         {
            model: "smartcloud entry appliance fi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.4",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.8",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.6",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.10",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3394",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0.1",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.2",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.5",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.4",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.3",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "rrdi",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.3.0",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.11",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "cognos business intelligence server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex node for mcs",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex meetings server multimedia platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "webex meetings for windows phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80",
         },
         {
            model: "webex meetings for blackberry",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex meetings for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex meetings client on-premises",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "webex meetings client hosted",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "webex meeting center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webex business suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "visual quality experience tools server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "visual quality experience server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtualization experience media edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtual security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "videoscape control suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance media server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell iuh",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.2.0",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "universal small cell series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "unity express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified workforce optimization quality management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "unified workforce optimization",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified sip proxy software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified meetingplace",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "unified ip conference phone for third-party call control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "unified ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69450",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69010",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified intelligence center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager im & presence service (formerly c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified communications domain manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console premium edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console department edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console business edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "ucs manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs central software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs b-series blade servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ucs series and series fabric interconnects",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "620063000",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence tx9000 series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system tx1310",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8200",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3103200",
         },
         {
            model: "telepresence server and mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "701087100",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence mcu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence isdn gateway mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "telepresence isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence conductor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "tandberg codian isdn gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "stealthwatch udp director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "stealthwatch management console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "stealthwatch identity",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "stealthwatch flowcollector sflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "stealthwatch flowcollector netflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa525g 5-line ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "socialminer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart net total care local collector appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "smart care",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "small business series managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "show and share",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "services provisioning platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "secure access control system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "registered envelope service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime performance manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime optical for service providers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime license manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime ip express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime infrastructure plug and play standalone gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime collaboration assurance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime access registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "partner support service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "packaged contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154540",
         },
         {
            model: "onepk all-in-one virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches standalone nx-os mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "nexus series blade switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v0",
         },
         {
            model: "network performance analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "netflow generation appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nac appliance clean access server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "nac appliance clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "mxe series media experience engines",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "35000",
         },
         {
            model: "multicast manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mediasense",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "media services interface",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mds series multilayer switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber client framework components",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ip series phones vpn feature",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800-0",
         },
         {
            model: "ip series phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "78000",
         },
         {
            model: "intrusion prevention system solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "intracer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "firesight system software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise content delivery system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3400",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "dx series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "content security appliance update servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "connected grid routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "common services platform collector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloupia unified infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud web security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud object storage",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clean access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "asr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "asa next-generation firewall services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "application policy infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "application and content networking system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "x0",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aironet series access points",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "27000",
         },
         {
            model: "agent for openflow",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ace30 application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ace application control engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "47100",
         },
         {
            model: "industrial router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9100",
         },
         {
            model: "series stackable managed switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "series smart plus switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2200",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "infinity",
            scope: "ne",
            trust: 0.3,
            vendor: "pexip",
            version: "13",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1.8",
         },
         {
            model: "vm virtualbox",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "5.0.28",
         },
         {
            model: "oss support tools",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "8.15.17.3.14",
         },
         {
            model: "project openssl",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: "1.1",
         },
         {
            model: "email gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.406-3402.103",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1051.08",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "tivoli provisioning manager for images build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.20290.1",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.13150-13",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.3.1",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.2.5",
         },
         {
            model: "security network protection",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.1.11",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.23",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.3-6513",
         },
         {
            model: "wireless lan controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.4",
         },
         {
            model: "webex meetings server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.1.30",
         },
         {
            model: "webex meetings for windows phone",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "82.8",
         },
         {
            model: "webex meetings client on-premises t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "webex meetings client hosted t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "webex centers t32",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "virtualization experience media edition",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "virtual security gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.6",
         },
         {
            model: "videoscape anyres live",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.7.2",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70002.9",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.9",
         },
         {
            model: "video surveillance 4300e and 4500e high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.9",
         },
         {
            model: "video surveillance series high-definition ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "40002.9",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30002.9",
         },
         {
            model: "video distribution suite for internet streaming",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.003(002)",
         },
         {
            model: "universal small cell iuh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "universal small cell cloudbase factory recovery root filesystem",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.17.3",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.5.12.23",
         },
         {
            model: "universal small cell series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.5.12.23",
         },
         {
            model: "unity express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "unified workforce optimization quality management solution 11.5 su1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unified sip proxy software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10",
         },
         {
            model: "unified meetingplace 8.6mr1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unified ip conference phone for third-party call control 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "unified ip conference phone 10.3.1sr4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8831",
         },
         {
            model: "unified ip phone 9.3 sr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6901",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "unified intelligence center",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6(1)",
         },
         {
            model: "unified contact center express",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "unified contact center enterprise",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "ucs standalone c-series rack server integrated management cont",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "-3.0",
         },
         {
            model: "ucs b-series blade servers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1.3",
         },
         {
            model: "uc integration for microsoft lync",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.3",
         },
         {
            model: "telepresence video communication server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "telepresence tx9000 series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "telepresence system tx1310",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "telepresence system ex series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence system ex series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-376.1",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500-326.1",
         },
         {
            model: "telepresence system series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "30006.1",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "13006.1",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11006.1",
         },
         {
            model: "telepresence system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10006.1",
         },
         {
            model: "telepresence sx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence sx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8204.4",
         },
         {
            model: "telepresence server on multiparty media and",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3103204.4",
         },
         {
            model: "telepresence server and mse",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "701087104.4",
         },
         {
            model: "telepresence profile series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence profile series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence mx series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence mx series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence mcu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1.89)",
         },
         {
            model: "telepresence integrator c series tc7.3.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "telepresence integrator c series ce8.2.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4.2",
         },
         {
            model: "services provisioning platform sfp1.1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "security manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.13",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.8",
         },
         {
            model: "secure access control system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.8.0.32.7",
         },
         {
            model: "prime performance manager sp1611",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.7",
         },
         {
            model: "prime network services controller 1.01u",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3.5",
         },
         {
            model: "prime network registrar",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.0",
         },
         {
            model: "prime network",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "431",
         },
         {
            model: "prime infrastructure",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "prime collaboration provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "prime collaboration assurance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6",
         },
         {
            model: "ons series multiservice provisioning platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1545410.7",
         },
         {
            model: "nexus series switches standalone nx-os mode 7.0 i5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "70006.2.19",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7000",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2.19",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "nexus series switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.2.19",
         },
         {
            model: "nexus series switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "nexus series blade switches 4.1 e1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "nexus series switches 5.2 sv3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1000v",
         },
         {
            model: "network analysis module",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "network analysis module 6.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "netflow generation appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(1)",
         },
         {
            model: "mds series multilayer switches",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "90006.2.19",
         },
         {
            model: "mds series multilayer switches 5.2.8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "jabber software development kit",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "jabber guest",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11",
         },
         {
            model: "jabber for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "jabber for mac",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "jabber for iphone and ipad",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "jabber for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "jabber client framework components",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.8",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0(1)",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.4",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.3",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.2",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "16.1",
         },
         {
            model: "ios and cisco ios xe software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.5(3)",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.0.1",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.1.3",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.1.9",
         },
         {
            model: "firesight system software",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4.0.10",
         },
         {
            model: "expressway series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x8.8.3",
         },
         {
            model: "enterprise content delivery system",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.9",
         },
         {
            model: "email security appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.0.1",
         },
         {
            model: "edge digital media player 1.2rb1.0.3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "340",
         },
         {
            model: "edge digital media player 1.6rb5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "300",
         },
         {
            model: "digital media manager 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "digital media manager 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "dcm series d9900 digital content manager",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "content security management appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.140",
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "15.8.9",
         },
         {
            model: "connected grid routers",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "computer telephony integration object server",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.6.1",
         },
         {
            model: "common services platform collector",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.11",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1901.3",
         },
         {
            model: "asr series",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "500021.2",
         },
         {
            model: "asa next-generation firewall services",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1.2",
         },
         {
            model: "application policy infrastructure controller",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "anyconnect secure mobility client for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "anyconnect secure mobility client for mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "x4.0.7",
         },
         {
            model: "anyconnect secure mobility client for linux",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3.4",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.4",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.3",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.2",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270016.1",
         },
         {
            model: "aironet series access points",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "270015.5(3)",
         },
         {
            model: "industrial router 1.2.1rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "910",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4400",
         },
         {
            model: "series digital media players 5.4.1 rb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
         {
            model: "series digital media players 5.3.6 rb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4300",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "92982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:capssuite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterpriseidentitymanager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragent",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:esmpro_serveragentservice",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix1000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2016-2181",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2016-2181",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2016-2181",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2016-2181",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2016-2181",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201609-102",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-2181",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. \nVersions prior to OpenSSL 1.1.0 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2016:1940-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1940.html\nIssue date:        2016-09-27\nCVE Names:         CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 \n                   CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 \n                   CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 \n=====================================================================\n\n1. Summary:\n\nAn update for openssl is now available for Red Hat Enterprise Linux 6 and\nRed Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and\nTransport Layer Security (TLS) protocols, as well as a full-strength\ngeneral-purpose cryptography library. A remote attacker\ncould cause a TLS server using OpenSSL to consume an excessive amount of\nmemory and, possibly, exit unexpectedly after exhausting all available\nmemory, if it enabled OCSP stapling support. \n(CVE-2016-2178)\n\n* It was discovered that the Datagram TLS (DTLS) implementation could fail\nto release memory in certain cases. A malicious DTLS client could cause a\nDTLS server using OpenSSL to consume an excessive amount of memory and,\npossibly, exit unexpectedly after exhausting all available memory. A remote attacker could possibly use this flaw\nto make a DTLS server using OpenSSL to reject further packets sent from a\nDTLS client over an established DTLS connection. (CVE-2016-2181)\n\n* An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec()\nfunction. (CVE-2016-2182)\n\n* A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL\nprotocol. A man-in-the-middle attacker could use this flaw to recover some\nplaintext data by capturing large amounts of encrypted traffic between\nTLS/SSL server and client if the communication used a DES/3DES based\nciphersuite. (CVE-2016-2183)\n\nThis update mitigates the CVE-2016-2183 issue by lowering priority of DES\ncipher suites so they are not preferred over cipher suites using AES. For\ncompatibility reasons, DES cipher suites remain enabled by default and\nincluded in the set of cipher suites identified by the HIGH cipher string. \nFuture updates may move them to MEDIUM or not enable them by default. \n\n* An integer underflow flaw leading to a buffer over-read was found in the\nway OpenSSL parsed TLS session tickets. (CVE-2016-6302)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed\npointer arithmetic. A remote attacker could possibly use these flaws to\ncause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\n* An out of bounds read flaw was found in the way OpenSSL formatted Public\nKey Infrastructure Time-Stamp Protocol data for printing. An attacker could\npossibly cause an application using OpenSSL to crash if it printed time\nstamp data from the attacker. A remote attacker could\npossibly use these flaws to crash a TLS/SSL server or client using OpenSSL. \n(CVE-2016-6306)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304\nand CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase\n1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation\n1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio()\n1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()\n1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection\n1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)\n1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer\n1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks\n1377594 - CVE-2016-6306 openssl: certificate message OOB reads\n1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.s390x.rpm\nopenssl-static-1.0.1e-48.el6_8.3.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-48.el6_8.3.src.rpm\n\ni386:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.i686.rpm\nopenssl-static-1.0.1e-48.el6_8.3.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm\nopenssl-static-1.0.1e-48.el6_8.3.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nppc64:\nopenssl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64.rpm\n\nppc64le:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm\nopenssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.s390x.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390.rpm\nopenssl-static-1.0.1e-51.el7_2.7.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.7.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.7.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-2177\nhttps://access.redhat.com/security/cve/CVE-2016-2178\nhttps://access.redhat.com/security/cve/CVE-2016-2179\nhttps://access.redhat.com/security/cve/CVE-2016-2180\nhttps://access.redhat.com/security/cve/CVE-2016-2181\nhttps://access.redhat.com/security/cve/CVE-2016-2182\nhttps://access.redhat.com/security/cve/CVE-2016-6302\nhttps://access.redhat.com/security/cve/CVE-2016-6304\nhttps://access.redhat.com/security/cve/CVE-2016-6306\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://www.openssl.org/news/secadv/20160922.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI\nxpTW7ApBLmKhVjs49DGYouI=\n=4VgY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Additional information can be found at\n    https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/    \n\nCVE-2016-2178\n\n    Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing\n    leak in the DSA code. \n\nCVE-2016-2179 / CVE-2016-2181\n\n    Quan Luo and the OCAP audit team discovered denial of service\n    vulnerabilities in DTLS. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.0.1t-1+deb8u4. \n\nFor the unstable distribution (sid), these problems will be fixed soon. ==========================================================================\nUbuntu Security Notice USN-3087-2\nSeptember 23, 2016\n\nopenssl regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nUSN-3087-1 introduced a regression in OpenSSL. The fix for CVE-2016-2182 was\nincomplete and caused a regression when parsing certificates. This update\nfixes the problem. \n\nWe apologize for the inconvenience. This\n issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2178)\n  Quan Luo discovered that OpenSSL did not properly restrict the lifetime\n of queue entries in the DTLS implementation. (CVE-2016-2181)\n  Shi Lei discovered that OpenSSL incorrectly validated division results. \n (CVE-2016-2182)\n  Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES\n ciphers were vulnerable to birthday attacks. \n (CVE-2016-2183)\n  Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths. (CVE-2016-6303)\n  Shi Lei discovered that OpenSSL incorrectly performed certain message\n length checks. (CVE-2016-6306)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n  libssl1.0.0                     1.0.2g-1ubuntu4.5\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.21\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.38\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \nOpenSSL Security Advisory [22 Sep 2016]\n========================================\n\nOCSP Status Request extension unbounded memory growth (CVE-2016-6304)\n=====================================================================\n\nSeverity: High\n\nA malicious client can send an excessively large OCSP Status Request extension. \nIf that client continually requests renegotiation, sending a large OCSP Status\nRequest extension each time, then there will be unbounded memory growth on the\nserver. This will eventually lead to a Denial Of Service attack through memory\nexhaustion. Servers with a default configuration are vulnerable even if they do\nnot support OCSP. Builds using the \"no-ocsp\" build time option are not affected. \n\nServers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default\nconfiguration, instead only if an application explicitly enables OCSP stapling\nsupport. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 29th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nSSL_peek() hang on empty record (CVE-2016-6305)\n===============================================\n\nSeverity: Moderate\n\nOpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an\nempty record. This could be exploited by a malicious peer in a Denial Of Service\nattack. \n\nOpenSSL 1.1.0 users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 10th September 2016 by Alex Gaynor. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nSWEET32 Mitigation (CVE-2016-2183)\n==================================\n\nSeverity: Low\n\nSWEET32 (https://sweet32.info) is an attack on older block cipher algorithms\nthat use a block size of 64 bits. In mitigation for the SWEET32 attack DES based\nciphersuites have been moved from the HIGH cipherstring group to MEDIUM in\nOpenSSL 1.0.1 and OpenSSL 1.0.2.  OpenSSL 1.1.0 since release has had these\nciphersuites disabled by default. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 16th August 2016 by Karthikeyan\nBhargavan and Gaetan Leurent (INRIA). The fix was developed by Rich Salz of the\nOpenSSL development team. \n\nOOB write in MDC2_Update() (CVE-2016-6303)\n==========================================\n\nSeverity: Low\n\nAn overflow can occur in MDC2_Update() either if called directly or\nthrough the EVP_DigestUpdate() function using MDC2. If an attacker\nis able to supply very large amounts of input data after a previous\ncall to EVP_EncryptUpdate() with a partial block then a length check\ncan overflow resulting in a heap corruption. \n\nThe amount of data needed is comparable to SIZE_MAX which is impractical\non most platforms. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 11th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nMalformed SHA512 ticket DoS (CVE-2016-6302)\n===========================================\n\nSeverity: Low\n\nIf a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a\nDoS attack where a malformed ticket will result in an OOB read which will\nultimately crash. \n\nThe use of SHA512 in TLS session tickets is comparatively rare as it requires\na custom server callback and ticket lookup mechanism. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 19th August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB write in BN_bn2dec() (CVE-2016-2182)\n========================================\n\nSeverity: Low\n\nThe function BN_bn2dec() does not check the return value of BN_div_word(). \nThis can cause an OOB write if an application uses this function with an\noverly large BIGNUM. This could be a problem if an overly large certificate\nor CRL is printed out from an untrusted source. TLS is not affected because\nrecord limits will reject an oversized certificate before it is parsed. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 2nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nOOB read in TS_OBJ_print_bio() (CVE-2016-2180)\n==============================================\n\nSeverity: Low\n\nThe function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is\nthe total length the OID text representation would use and not the amount\nof data written. This will result in OOB reads when large OIDs are presented. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st July 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nPointer arithmetic undefined behaviour (CVE-2016-2177)\n======================================================\n\nSeverity: Low\n\nAvoid some undefined pointer arithmetic\n\nA common idiom in the codebase is to check limits in the following manner:\n\"p + len > limit\"\n\nWhere \"p\" points to some malloc'd data of SIZE bytes and\nlimit == p + SIZE\n\n\"len\" here could be from some externally supplied data (e.g. from a TLS\nmessage). \n\nThe rules of C pointer arithmetic are such that \"p + len\" is only well\ndefined where len <= SIZE. Therefore the above idiom is actually\nundefined behaviour. \n\nFor example this could cause problems if some malloc implementation\nprovides an address for \"p\" such that \"p + len\" actually overflows for\nvalues of len that are too big and therefore p + len < limit. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nConstant time flag not preserved in DSA signing (CVE-2016-2178)\n===============================================================\n\nSeverity: Low\n\nOperations in the DSA signing algorithm should run in constant time in order to\navoid side channel attacks. A flaw in the OpenSSL DSA implementation means that\na non-constant time codepath is followed for certain operations. This has been\ndemonstrated through a cache-timing attack to be sufficient for an attacker to\nrecover the private DSA key. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 23rd May 2016 by César Pereida (Aalto\nUniversity), Billy Brumley (Tampere University of Technology), and Yuval Yarom\n(The University of Adelaide and NICTA). The fix was developed by César Pereida. \n\nDTLS buffered message DoS (CVE-2016-2179)\n=========================================\n\nSeverity: Low\n\nIn a DTLS connection where handshake messages are delivered out-of-order those\nmessages that OpenSSL is not yet ready to process will be buffered for later\nuse. Under certain circumstances, a flaw in the logic means that those messages\ndo not get removed from the buffer even though the handshake has been completed. \nAn attacker could force up to approx. 15 messages to remain in the buffer when\nthey are no longer required. These messages will be cleared when the DTLS\nconnection is closed. The default maximum size for a message is 100k. Therefore\nthe attacker could force an additional 1500k to be consumed per connection. By\nopening many simulataneous connections an attacker could cause a DoS attack\nthrough memory exhaustion. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd June 2016 by Quan Luo. The fix was\ndeveloped by Matt Caswell of the OpenSSL development team. \n\nDTLS replay protection DoS (CVE-2016-2181)\n==========================================\n\nSeverity: Low\n\nA flaw in the DTLS replay attack protection mechanism means that records that\narrive for future epochs update the replay protection \"window\" before the MAC\nfor the record has been validated. This could be exploited by an attacker by\nsending a record for the next epoch (which does not have to decrypt or have a\nvalid MAC), with a very large sequence number. This means that all subsequent\nlegitimate packets are dropped causing a denial of service for a specific\nDTLS connection. \n\nOpenSSL 1.0.2 DTLS users should upgrade to 1.0.2i\nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 21st November 2015 by the OCAP audit team. \nThe fix was developed by Matt Caswell of the OpenSSL development team. \n\nCertificate message OOB reads (CVE-2016-6306)\n=============================================\n\nSeverity: Low\n\nIn OpenSSL 1.0.2 and earlier some missing message length checks can result in\nOOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical\nDoS risk but this has not been observed in practice on common platforms. \n\nThe messages affected are client certificate, client certificate request and\nserver certificate. As a result the attack can only be performed against\na client or a server which enables client authentication. \n\nOpenSSL 1.1.0 is not affected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2i\nOpenSSL 1.0.1 users should upgrade to 1.0.1u\n\nThis issue was reported to OpenSSL on 22nd August 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Stephen Henson of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in tls_get_message_header() (CVE-2016-6307)\n==========================================================================\n\nSeverity: Low\n\nA TLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. This could lead\nto a Denial of Service through memory exhaustion. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect DTLS users. \n\nOpenSSL 1.1.0 TLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nExcessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)\n=============================================================================\n\nSeverity: Low\n\nThis issue is very similar to CVE-2016-6307. The underlying defect is different\nbut the security analysis and impacts are the same except that it impacts DTLS. \n\nA DTLS message includes 3 bytes for its length in the header for the message. \nThis would allow for messages up to 16Mb in length. Messages of this length are\nexcessive and OpenSSL includes a check to ensure that a peer is sending\nreasonably sized messages in order to avoid too much memory being consumed to\nservice a connection. A flaw in the logic of version 1.1.0 means that memory for\nthe message is allocated too early, prior to the excessive message length\ncheck. Due to way memory is allocated in OpenSSL this could mean an attacker\ncould force up to 21Mb to be allocated to service a connection. This could lead\nto a Denial of Service through memory exhaustion. However, the excessive message\nlength check still takes place, and this would cause the connection to\nimmediately fail. Assuming that the application calls SSL_free() on the failed\nconneciton in a timely manner then the 21Mb of allocated memory will then be\nimmediately freed again. Therefore the excessive memory allocation will be\ntransitory in nature. This then means that there is only a security impact if:\n\n1) The application does not call SSL_free() in a timely manner in the\nevent that the connection fails\nor\n2) The application is working in a constrained environment where there\nis very little free memory\nor\n3) The attacker initiates multiple connection attempts such that there\nare multiple connections in a state where memory has been allocated for\nthe connection; SSL_free() has not yet been called; and there is\ninsufficient memory to service the multiple requests. \n\nExcept in the instance of (1) above any Denial Of Service is likely to\nbe transitory because as soon as the connection fails the memory is\nsubsequently freed again in the SSL_free() call. However there is an\nincreased risk during this period of application crashes due to the lack\nof memory - which would then mean a more serious Denial of Service. \n\nThis issue does not affect TLS users. \n\nOpenSSL 1.1.0 DTLS users should upgrade to 1.1.0a\n\nThis issue was reported to OpenSSL on 18th September 2016 by Shi Lei (Gear Team,\nQihoo 360 Inc.). The fix was developed by Matt Caswell of the OpenSSL\ndevelopment team. \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/policies/releasestrat.html), support for OpenSSL\nversion 1.0.1 will cease on 31st December 2016. No security updates for that\nversion will be provided after that date. Users of 1.0.1 are advised to\nupgrade. \n\nSupport for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those\nversions are no longer receiving security updates. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv/20160922.txt\n\nNote: the online version of the advisory may be updated with additional details\nover time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/policies/secpolicy.html\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "BID",
            id: "92982",
         },
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-2181",
            trust: 3.3,
         },
         {
            db: "BID",
            id: "92982",
            trust: 2,
         },
         {
            db: "MCAFEE",
            id: "SB10215",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1036690",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-16",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-21",
            trust: 1.7,
         },
         {
            db: "TENABLE",
            id: "TNS-2016-20",
            trust: 1.7,
         },
         {
            db: "PULSESECURE",
            id: "SA40312",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "JUNIPER",
            id: "JSA10759",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU98667810",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-2181",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138870",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138817",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138820",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "138826",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169633",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "BID",
            id: "92982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   id: "VAR-201609-0596",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.395923525,
   },
   last_update_date: "2024-11-23T21:09:13.970000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sa-20160927-openssl",
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl",
         },
         {
            title: "1995039",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            title: "NV17-001",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv17-001.html",
         },
         {
            title: "OpenSSL 1.0.2 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.2-notes.html",
         },
         {
            title: "OpenSSL 1.0.1 Series Release Notes",
            trust: 0.8,
            url: "https://www.openssl.org/news/openssl-1.0.1-notes.html",
         },
         {
            title: "Fix DTLS replay protection",
            trust: 0.8,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            title: "Oracle Linux Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            title: "Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            title: "SA40312",
            trust: 0.8,
            url: "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
         },
         {
            title: "SA132",
            trust: 0.8,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            title: "JSA10759",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
         },
         {
            title: "Splunk Enterprise 6.4.5 addresses multiple vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPUE",
         },
         {
            title: "Splunk Enterprise 6.5.1 addresses multiple OpenSSL vulnerabilities",
            trust: 0.8,
            url: "http://www.splunk.com/view/SP-CAAAPSV",
         },
         {
            title: "TNS-2016-16",
            trust: 0.8,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            title: "OpenSSL Remediation measures for denial of service vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=63925",
         },
         {
            title: "Red Hat: Important: openssl security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20161940 - Security Advisory",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-2181",
         },
         {
            title: "Red Hat: CVE-2016-2181",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-2181",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3087-2",
         },
         {
            title: "Amazon Linux AMI: ALAS-2016-755",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-755",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-23] openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-23",
         },
         {
            title: "Arch Linux Advisories: [ASA-201609-24] lib32-openssl: multiple issues",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201609-24",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Tenable Security Advisories: [R7] Nessus 6.9 Fixes Multiple Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-16",
         },
         {
            title: "Symantec Security Advisories: SA132 : OpenSSL Vulnerabilities 22-Sep-2016 and 26-Sep-2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=1e6dcaf5dac6ef96a7d917a8c1393040",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160927-openssl",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=ac5af5dd99788925425f5747ec672707",
         },
         {
            title: "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-20",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=586e6062440cdd312211d748e028164e",
         },
         {
            title: "Tenable Security Advisories: [R2] LCE 4.8.2 Fixes Multiple Third-party Library Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-21",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6839c4d3fd328571c675c335d58b5591",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Forcepoint Security Advisories: CVE-2016-2180 to -2183, -6302 to -6309, -2179, -7052 OpenSSL Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=a9dd8a175d084c7432b7ad47715ac50c",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=a31bff03e9909229fd67996884614fdf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d",
         },
         {
            title: "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=21c0efa2643d707e2f50a501209eb75c",
         },
         {
            title: "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=13f3551b67d913fba90df4b2c0dae0bf",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4019ca77f50c7a34e4d97833e6f3321e",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2016-2181 ",
         },
         {
            title: "alpine-cvecheck",
            trust: 0.1,
            url: "https://github.com/tomwillfixit/alpine-cvecheck ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-189",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
         },
         {
            trust: 1.9,
            url: "http://www.ubuntu.com/usn/usn-3087-1",
         },
         {
            trust: 1.8,
            url: "http://rhn.redhat.com/errata/rhsa-2016-1940.html",
         },
         {
            trust: 1.8,
            url: "http://www.ubuntu.com/usn/usn-3087-2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/92982",
         },
         {
            trust: 1.7,
            url: "http://www.splunk.com/view/sp-caaapue",
         },
         {
            trust: 1.7,
            url: "http://www.splunk.com/view/sp-caaapsv",
         },
         {
            trust: 1.7,
            url: "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40312",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa132",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10759",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-16",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1036690",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-21",
         },
         {
            trust: 1.7,
            url: "https://www.tenable.com/security/tns-2016-20",
         },
         {
            trust: 1.7,
            url: "https://security.freebsd.org/advisories/freebsd-sa-16:26.openssl.asc",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html",
         },
         {
            trust: 1.7,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10215",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html",
         },
         {
            trust: 1.7,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html",
         },
         {
            trust: 1.7,
            url: "http://seclists.org/fulldisclosure/2017/jul/31",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2016/dsa-3673",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html",
         },
         {
            trust: 1.7,
            url: "https://support.f5.com/csp/article/k59298921",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html",
         },
         {
            trust: 1.7,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770",
         },
         {
            trust: 0.9,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160927-openssl",
         },
         {
            trust: 0.9,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=1fb9fdc3027b27d8eb6a1e6a846435b070980770",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2181",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu98667810/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2181",
         },
         {
            trust: 0.8,
            url: "http://www.bizmobile.co.jp/news_02.php?id=4069&nc=1",
         },
         {
            trust: 0.6,
            url: "https://www.openssl.org/news/vulnerabilities.html#y2017",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2182",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2178",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6302",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2179",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2177",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2181",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6306",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6304",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2180",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6303",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2183",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369113",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc",
         },
         {
            trust: 0.3,
            url: "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-openssl-affect-ibm-worklight-and-ibm-mobilefirst-platform-foundation-2/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024394",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1024401",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024648",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021643",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2016-10-07.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21991724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992348",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21992898",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993061",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993856",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21993875",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995392",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995393",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995691",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995886",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996181",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000242",
         },
         {
            trust: 0.2,
            url: "https://www.openssl.org/news/secadv/20160922.txt",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/189.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2016-2181",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=48599",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/3087-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2180",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6306",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2181",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6304",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2179",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2182",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6302",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.37",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.21",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.38",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.5",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1626883",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6308",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6305",
         },
         {
            trust: 0.1,
            url: "https://sweet32.info)",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/policies/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-6307",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "BID",
            id: "92982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            db: "BID",
            id: "92982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-09-16T00:00:00",
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            date: "2016-07-05T00:00:00",
            db: "BID",
            id: "92982",
         },
         {
            date: "2016-09-21T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            date: "2016-09-27T19:32:00",
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            date: "2016-09-22T22:22:00",
            db: "PACKETSTORM",
            id: "138817",
         },
         {
            date: "2016-09-22T22:25:00",
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            date: "2016-09-23T19:19:00",
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            date: "2016-09-22T12:12:12",
            db: "PACKETSTORM",
            id: "169633",
         },
         {
            date: "2016-08-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            date: "2016-09-16T05:59:01.347000",
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2016-2181",
         },
         {
            date: "2018-02-05T14:00:00",
            db: "BID",
            id: "92982",
         },
         {
            date: "2017-07-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
         {
            date: "2024-11-21T02:47:58.720000",
            db: "NVD",
            id: "CVE-2016-2181",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "138870",
         },
         {
            db: "PACKETSTORM",
            id: "138820",
         },
         {
            db: "PACKETSTORM",
            id: "138826",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  DTLS Service disruption in the anti-replay functionality of the implementation  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-004779",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "digital error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201609-102",
         },
      ],
      trust: 0.6,
   },
}

var-201403-0514
Vulnerability from variot

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. OpenSSL is prone to an information-disclosure weakness. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

APPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update 2014-004

OS X Mavericks 10.9.5 and Security Update 2014-004 are now available and address the following:

apache_mod_php Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in PHP 5.4.24 Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30 CVE-ID CVE-2013-7345 CVE-2014-0185 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-3981 CVE-2014-4049

Bluetooth Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4390 : Ian Beer of Google Project Zero

CoreGraphics Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

CoreGraphics Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

Foundation Available for: OS X Mavericks 10.9 to 10.9.4 Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4393 : Apple

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-4394 : Ian Beer of Google Project Zero CVE-2014-4395 : Ian Beer of Google Project Zero CVE-2014-4396 : Ian Beer of Google Project Zero CVE-2014-4397 : Ian Beer of Google Project Zero CVE-2014-4398 : Ian Beer of Google Project Zero CVE-2014-4399 : Ian Beer of Google Project Zero CVE-2014-4400 : Ian Beer of Google Project Zero CVE-2014-4401 : Ian Beer of Google Project Zero CVE-2014-4416 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4376 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4402 : Ian Beer of Google Project Zero

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4379 : Ian Beer of Google Project Zero

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4388 : @PanguTeam

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses. CVE-ID CVE-2014-4403 : Ian Beer of Google Project Zero

Libnotify Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking CVE-ID CVE-2014-4381 : Ian Beer of Google Project Zero

OpenSSL Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. This update was addressed by updating OpenSSL to version 0.9.8za. CVE-ID CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

ruby Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A remote attacker may be able to cause arbitrary code execution Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6 CVE-ID CVE-2014-2525

Note: OS X Mavericks 10.9.5 includes the security content of Safari 7.0.6: http://support.apple.com/kb/HT6367

OS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJUGkP0AAoJEBcWfLTuOo7tygQP/1vHYXtWy6492Tjj6ycymWa+ Ct0eCCBU/AUi5ODNDeV9ddWkuFeXKbgQSHoPU19IPcIBAKnYUupVJSJ/cEHfSthh CiROjJw8Bt8comn04BgggHieLveN1xQCXQDcO29kBIpQr394XKS0lNXP//Z0oG5V sCnEDPz/0R92mwT5XkKD9WC7G/WjybS5V7BjEbdzDOn4qdTVje05xI5pof+fkeQ1 hFHo7uTCDkSzLH2YxrQHifNVyItz8AgnNHwH7zc6XmNtiNFkiFP/KU6BYyr8WiTQ Jb3pyLB/Xvmbd0kuETnDNvV0oJc88G38a++xZPnuM7zQrW/TQkkKQpiqKtYAiJuw ZhUoky620/7HULegcYtsTyuDFyEN6whdSmHLFCJzk2oZXZ7MPA8ywCFB8Y79rohW 5MTe/zVUSxxYBgVXpkmhPwXYSTINeUJGJA1RQtXhC2Hh6O2jeqJP2H0hTmgsCBRA 3X/2CGoyAAgoKTJwgXk07tBbJWf+wQwAvUN9L1Yph+uOvvUzqFt8LNEGw9jVPsZl QHcSEW/Ef/HK/OLwVZiPqse6lRJAdRZl5//vm4408jnXfJCy6KnvxcsO4Z1yTyoP kCXdWlSLBiidcRRWBfoQBSC3gANcx9a56ItWieEvJrdNOiyhb+gqEk7XraOlb/gf k4w2RKNm0Fv+kdNoFAnd =gpVc -----END PGP SIGNATURE-----

. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04343424

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04343424 Version: 1

HPSBGN03050 rev.1 - HP IceWall SSO Dfw and HP IceWall MCRP running OpenSSL, Remote Denial of Service (DoS), Code Execution, Security Restriction Bypass, Disclosure of Information, or Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-07-07 Last Updated: 2014-07-07

Potential Security Impact: Remote execution of arbitrary code

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP IceWall SSO Dfw and HP IceWall MCRP running OpenSSL. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS), execute code, allow unauthorized access, or disclose information.

References:

CVE-2014-0076 Remote Denial of Service (DoS) CVE-2014-0195 Remote Unauthorized Access CVE-2014-0221 Remote Denial of Service (DoS) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information CVE-2014-3470 Remote Code Execution or Unauthorized Access SSRT101609

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP IceWall SSO Dfw v8.0, v8.0 R1, v8.0 R2, v8.0 R3, and v10.0 HP IceWall SSO Certd v8.0 R3 HP IceWall SSO Dfw Certd v10.0 HP IceWall SSO Agent Option v8.0 2007 and v10.0 (CVE-2014-0076 only) HP IceWall MCRP v2.1 and v3.0

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP recommends the following software update options to resolve these vulnerabilities.

For HP IceWall products which bundle OpenSSL, an OpenSSL software update is available at the following location:

http://www.hp.com/jp/icewall_patchaccess

For RHEL, apply RHEL's OpenSSL patch:

https://access.redhat.com/site/articles/904433

Note: CVE-2014-0076 is not impacted on RHEL

https://access.redhat.com/security/cve/CVE-2014-0076

For HP-UX, apply HP-UX OpenSSL update as referenced in the following HP Security Bulletin HPSBUX03046 :

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_n a-c04336637

HP recommends the following mitigation information to protect against potential risk for the following HP IceWall products.

HP IceWall SSO Dfw and MCRP

If possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to use SSL/TLS for back-end web server connection.

HP IceWall SSO Dfw Certd

If possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS on any connection with LDAP server.

Note: The HP IceWall product is only available in Japan.

HISTORY Version:1 (rev.1) - 7 July 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. HP Version Control Repository Manager (VCRM) version 7.3.3 and earlier for Linux and Windows. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

ESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities

EMC Identifier: ESA-2014-079

CVE Identifier: See below for individual CVEs

Severity Rating: CVSS v2 Base Score: See below for individual CVSS score for each CVE

Affected products:
\x95 All EMC Documentum Content Server versions of 7.1 prior to P07 \x95 All EMC Documentum Content Server versions of 7.0 \x95 All EMC Documentum Content Server versions of 6.7 SP2 prior to P16 \x95 All EMC Documentum Content Server versions of 6.7 SP1 \x95 All EMC Documentum Content Server versions prior to 6.7 SP1

Summary:
EMC Documentum Content Server contains fixes for multiple vulnerabilities which also include vulnerabilities disclosed by the OpenSSL project on June 5, 2014 in OpenSSL.

Details: EMC Documentum Content Server may be susceptible to the following vulnerabilities:

\x95 Arbitrary Code Execution (CVE-2014-4618): Authenticated non-privileged users can potentially execute Documentum methods with higher level privileges (up to and including superuser privileges) due to improper authorization checks being performed on user-created system objects. CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

\x95 DQL Injection (CVE-2014-2520): Certain DQL hints in EMC Documentum Content Server may be potentially exploited by an authenticated non-privileged malicious user to conduct DQL injection attacks and read the database contents. This issue only affects Content Server running on Oracle database. CVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)

\x95 Information Disclosure (CVE-2014-2521): Authenticated non-privileged users are allowed to retrieve meta-data of unauthorized system objects due to improper authorization checks being performed on certain RPC commands in Content Server. CVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)

\x95 Multiple OpenSSL vulnerabilities (See individual CVEs below and refer to NVD for each of their scores): SSL/TLS Man-in-the-middle (MITM) vulnerability (CVE-2014-0224) DTLS recursion flaw (CVE-2014-0221) DTLS invalid fragment vulnerability (CVE-2014-0195) SSL_MODE_RELEASE_BUFFERS NULL pointer deference (CVE-2014-0198) SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298) Anonymous ECDH denial of service (CVE-2014-3470) FLUSH + RELOAD cache side-channel attack (CVE-2014-0076) For more information about these vulnerabilities, please visit the original OpenSSL advisory https://www.openssl.org/news/secadv_20140605.txt

Resolution: The following versions contain the resolution for these issues: \x95 EMC Documentum Content Server version 7.1 P07 and later \x95 EMC Documentum Content Server version 7.0: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \x95 EMC Documentum Content Server version 6.7 SP2 P16 and later \x95 EMC Documentum Content Server version 6.7 SP1: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests.

EMC recommends all customers to upgrade to one of the above versions at the earliest opportunity.

Link to remedies: Registered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/downloads/2732_Documentum-Server

For Hotfix, contact EMC Support.

Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

HP Systems Insight Manager v7.3 Hotfix kit HP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager v7.2 Hotfix kit is currently unavailable, but will be released at a later date.

http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

NOTE: No reboot of the system is required after applying the HP SIM Hotfix kit. These vulnerabilities include:

  • The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information.

  • HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5

  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2010-5298
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)

CVE-2014-0076
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2014-0195
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-0198
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0221
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0224
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-3470
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-3566
  3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the following software updates to resolve the vulnerabilities in the impacted versions of HPE StoreVirtual products running HPE LeftHand OS.

LeftHand OS v11.5 - Patches 45019-00 and 45020 LeftHand OS v12.0 - Patches 50016-00 and 50017-00 LeftHand OS v12.5 - Patch 55016-00 LeftHand OS v12.6 - Patch 56002-00

Notes:

These patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision to OpenSSL v1.0.1e 48. These patches migrate Certificate Authority Hashing Algorithm from a weak hashing algorithm SHA1 to the stronger hashing algorithm SHA256. ============================================================================ Ubuntu Security Notice USN-2165-1 April 07, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary:

OpenSSL could be made to expose sensitive information over the network, possibly including private keys. An attacker could use this issue to perform side-channel attacks and possibly recover ECDSA nonces. (CVE-2014-0076)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.2

Ubuntu 12.10: libssl1.0.0 1.0.1c-3ubuntu2.7

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.12

After a standard system update you need to reboot your computer to make all the necessary changes. Since this issue may have resulted in compromised private keys, it is recommended to regenerate them.

References: http://www.ubuntu.com/usn/usn-2165-1 CVE-2014-0076, CVE-2014-0160

Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.2 https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.7 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.12 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-14:06.openssl Security Advisory The FreeBSD Project

Topic: OpenSSL multiple vulnerabilities

Category: contrib Module: openssl Announced: 2014-04-08 Affects: All supported versions of FreeBSD. Corrected: 2014-04-08 18:27:39 UTC (stable/10, 10.0-STABLE) 2014-04-08 18:27:46 UTC (releng/10.0, 10.0-RELEASE-p1) 2014-04-08 23:16:19 UTC (stable/9, 9.2-STABLE) 2014-04-08 23:16:05 UTC (releng/9.2, 9.2-RELEASE-p4) 2014-04-08 23:16:05 UTC (releng/9.1, 9.1-RELEASE-p11) 2014-04-08 23:16:19 UTC (stable/8, 8.4-STABLE) 2014-04-08 23:16:05 UTC (releng/8.4, 8.4-RELEASE-p8) 2014-04-08 23:16:05 UTC (releng/8.3, 8.3-RELEASE-p15) CVE Name: CVE-2014-0076, CVE-2014-0160

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

  1. Revision History

v1.0 2014-04-08 Initial release. v1.1 2014-04-08 Added patch applying step in Solutions section.

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS.

Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which uses Elliptic Curve Cryptography. OpenSSL uses the Montgomery Ladder Approach to compute scalar multiplication in a fixed amount of time, which does not leak any information through timing or power.

II. Problem Description

The code used to handle the Heartbeat Extension does not do sufficient boundary checks on record length, which allows reading beyond the actual payload. [CVE-2014-0160]. Affects FreeBSD 10.0 only.

A flaw in the implementation of Montgomery Ladder Approach would create a side-channel that leaks sensitive timing information. [CVE-2014-0076]

III. Impact

An attacker who can send a specifically crafted packet to TLS server or client with an established connection can reveal up to 64k of memory of the remote system. Such memory might contain sensitive information, including key material, protected content, etc. which could be directly useful, or might be leveraged to obtain elevated privileges. [CVE-2014-0160]

A local attacker might be able to snoop a signing process and might recover the signing key from it. [CVE-2014-0076]

IV. Workaround

No workaround is available, but systems that do not use OpenSSL to implement the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols implementation and do not use the ECDSA implementation from OpenSSL are not vulnerable.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 8.x and FreeBSD 9.x]

fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch

fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch.asc

gpg --verify openssl.patch.asc

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch

fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch.asc

gpg --verify openssl-10.patch.asc

b) Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

IMPORTANT: the update procedure above does not update OpenSSL from the Ports Collection or from a package, known as security/openssl, which has to be updated separately via ports or package.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r264285 releng/8.3/ r264284 releng/8.4/ r264284 stable/9/ r264285 releng/9.1/ r264284 releng/9.2/ r264284 stable/10/ r264266 releng/10.0/ r264267


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (FreeBSD)

iQIcBAEBCgAGBQJTRJySAAoJEO1n7NZdz2rnzPcQALd6So7vDRBaYiaGwQjc55oI QwTnNzkkgxVTGwi8lDV6h8bIW3Ga8AhMGoZCVOeKbDABBDghVYe6Na5e/wsHbPPu tXmDRhoi2aV0sVCTFfpoCNJ8l2lb+5vnmEC6Oi3PMQDbRC+Ptg15o0W/2hXw0eKO yu4BhS4dl6lX7IvlR1n4sr0rfa8vwxe5OpUUd6Bzw0SUBmV+BTzq1C70FuOZ/hnD ThaZS8Ox3fcWuPylhPbhxnWqg0oVNkBpiRYpIBadrpl9EiRRzbTfF+uFvauR9tBN 1mK8lLwd7DK6x8iCSnDd2ZlN1rNn8EPsGohT4vP+szz2E2YP1x8ugihEBdYax+Dh Z4TWkm3/wJwEf00G32E1hZ8F+UavE8AmnGVk6gxiRpnv2sdNJYRlWd9O8u251qMq uzcmBX6Jr14dQCwlqof8pYKYV7VCE/Cu4JHThOCL042CLwUmXyJVMFzm6WPQlNjC dlPbSG+PXjninPjcYBoMR+863X35Guv0pJBNG/ofEh+Jy5MveaMRQX/mA+wy29zm qg74lM07adXkJujPAuA5dYjZivpW1NPOHeIjaYjaI6KDw2q3BlkGa2C3PeYDQxn4 Iqujqpem5nyQY4BO2XC8gVtuym0jDSA98bgFXumNDkmzlUUuOFOWD8YScLopOzOu EpUXgezogk1Rd3EVsaJ+ =UBO0 -----END PGP SIGNATURE-----

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0514",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 1.5,
            vendor: "ibm",
            version: "1.50.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8w",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.3a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.3",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8y",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8u",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.5a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.2b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.6m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "bladecenter -t 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter advanced management module 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -h 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -e 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter advanced management module 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -s 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -ht 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -ht 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -h 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -t 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -e 3.66c",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter -s 3.66b",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "bladecenter t advanced management module 3.66b",
            scope: null,
            trust: 0.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system chassis management module",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "1.50.0",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.6",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v210.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3690x571471.43",
         },
         {
            model: "junos 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x571431.43",
         },
         {
            model: "rational clearquest",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.7",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.1",
         },
         {
            model: "tivoli workload scheduler distributed ga level",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2.0",
         },
         {
            model: "junos r8-s2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "sa6500 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "sa700 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.3r4.6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.1",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8886",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.40",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.20",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8852",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4.19",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.14",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos r1",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "tivoli workload scheduler distributed fp05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "tivoli workload scheduler distributed fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.17",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "junos 12.1r8-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56001",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "flex system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0.9",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "junos r2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "8.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "junos 12.1x47-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "worklight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "junos 12.2r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "sa2000 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.1",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.51",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "websphere application server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.33",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "junos 12.3r4-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "junos os 12.1x46-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.4",
         },
         {
            model: "system x3500m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73801.42",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.1x44-d20.3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.1",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.4.5",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73231.42",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "junose",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.16",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "junos 12.1r7-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos r3",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.6.0",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "junos 12.1r5-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8730",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "system x3200m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73271.42",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "12.3",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.5",
         },
         {
            model: "junos 12.2x50-d70",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "junos 12.1x46-d20.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.03",
         },
         {
            model: "junos 13.2x50-d15.3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos r6",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "sa2500 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "junos r11",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56002",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.3",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.00",
         },
         {
            model: "flashsystem 9848-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1886",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "junos 13.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77000",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.4-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "junos",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.24",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1.1",
         },
         {
            model: "security zsecure visual",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v19.7",
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "system x3200m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73281.42",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "junos r4-s2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos r1",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.13",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.1x49-d55",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x571451.43",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "netcool/system service monitor fp1 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0-",
         },
         {
            model: "junos 12.2r1.3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v310.1",
         },
         {
            model: "project openssl g",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "9.2-release-p4",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos r2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos r7",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.29",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.15",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "junos os 11.4r12-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "junos 12.3r2-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos 12.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "system x3630m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73771.42",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.38",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73211.42",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 12.1x47-d10",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "os/400 v1r5m0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "junos os 12.2r9",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7779",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.19",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.3",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.25",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.2r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.50",
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.1",
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.0",
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4.3",
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.3",
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8721",
         },
         {
            model: "junos 12.1r1.9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos os 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "8.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.35",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 12.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "puredata system for operational analytics a1791",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos 13.2r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "system x3400m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "78361.42",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3r3.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "icewall sso certd r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "junos 13.2x50-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl l",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junose",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2.1",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "junos 12.1r5.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "junos r8",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v110.1",
         },
         {
            model: "junos r2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos r6",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "sa6000 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "tivoli workload scheduler distributed fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearquest",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v35006.4.19",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "junos 13.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2143",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.1",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.4.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.2",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "tivoli monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.23",
         },
         {
            model: "junos 12.1x45-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storwize",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v37006.4",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.1",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "560010.1",
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8400",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.2",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "webapp secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "call management system r17.0",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "junos 13.2x51-d15.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "junos 12.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "88704.76.0",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ctpos 6.6r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x52-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos -d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos space 13.1r1.6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.2x50-d20.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system dx360m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73251.42",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.13",
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 13.2r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "junos d10",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.021",
         },
         {
            model: "junos r2",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "junos 12.3r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 13.3r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r8.7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3.5",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.10",
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "junos 12.1r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junose",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.0.3",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.029",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "junos 12.3r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "system integrated management module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2",
         },
         {
            model: "junos 13.1x49-d49",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8720",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "junos 13.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.2",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.27",
         },
         {
            model: "junos d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "tivoli monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.30",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "tivoli monitoring fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.229",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "junos 12.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "junos r3",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "system x3250m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "42511.42",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.31",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8750",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "85704.76.0",
         },
         {
            model: "junos 13.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56009.7",
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 13.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.2",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.3",
         },
         {
            model: "junos 13.1r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.1r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "junos 12.1x48-d62",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.19",
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 13.1r4-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.4",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.2",
         },
         {
            model: "hardware management console",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.31",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "junose",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "tivoli monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.22",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.5",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.12",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.16",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.22",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "junos os 13.2r5-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "junose",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1.2",
         },
         {
            model: "webex messenger service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 13.1r.3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "junos 13.2x52-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "idp series 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.4",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7893",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.5",
         },
         {
            model: "junos 12.1x44-d55",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x45-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "websphere application server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.4",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.10",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.11",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "junos 11.4r12-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.41",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "junos 12.1r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "system dx360m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "63911.42",
         },
         {
            model: "junos r4",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "junos 12.3r6.6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "junos 13.1x50-d15.1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.1x50-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "junos r7",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "76000",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x45-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.4",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "os/400 v1r4m0",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "systems director editions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli monitoring fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.235",
         },
         {
            model: "junos 13.2x51-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli monitoring fp",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.302",
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "junos 13.2r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.17",
         },
         {
            model: "junos 13.2x51-d25.2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "system x3550m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79441.42",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos os 13.1r4-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.19",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.13",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "junos r4",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7.0",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "junos r3",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "junos pulse for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "junos 13.1r3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "junos 12.3r7-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp series",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.5.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "junos 12.1x48-d41",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "flashsystem 9846-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "junos 12.1x46-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "junos 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7967",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.1",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.23",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "icewall sso dfw certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ctpos 6.6r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2x50-d40.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "flex system enterprise chassis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8724",
         },
         {
            model: "junos r8",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "rational clearcase",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1881",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.5.0",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.18",
         },
         {
            model: "8.3-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos 12.1r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.1",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.1",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.177",
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.41",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x571431.43",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "8.3-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1.11",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v39.7",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "tivoli remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.34",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "junos 12.1x45-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "junos 13.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3",
         },
         {
            model: "junos r1",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
         {
            model: "system x3400m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73781.42",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x44-d45",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "flex system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70007.1.0",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "junos r4",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "system x3250m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "42521.42",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos r4",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.37",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.5",
         },
         {
            model: "junos 12.1x45-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "screenos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "junos 13.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.0",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.9",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v29.7",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "rational clearcase",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.3",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "sa4000 ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "systems director storage control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.3.2",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "10.0-release-p1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "junos 12.2r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.19",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.5.2",
         },
         {
            model: "system x3620m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73761.42",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "san volume controller",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.19",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "system x3400m2 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "78371.42",
         },
         {
            model: "junos 12.2r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7989",
         },
         {
            model: "websphere application server",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.5.3",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.6",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8740",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.2x51-d27.2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "flex system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70006.4.1.9",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.4",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos r3",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x44-d24",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "junos r1",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "junos 13.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45-",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "9.2-releng",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "junos 12.2x50-d50.1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.33",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.18",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "junos 12.2r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8677",
         },
         {
            model: "system x3400m3 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "73791.42",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "hardware management console",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.0",
         },
         {
            model: "9.1-release-p11",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 0.9.8za",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "junos 12.3x48-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.00",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.7",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "project openssl m",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "rational requisitepro",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.32",
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.2",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "8.3-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "rational clearquest",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.6",
         },
         {
            model: "websphere application server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.010",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "66363",
         },
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
      ],
      trust: 0.5,
   },
   cve: "CVE-2014-0076",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 1.9,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "CVE-2014-0076",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 1.1,
                  vectorString: "AV:L/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0076",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-0076",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. OpenSSL is prone to an information-disclosure weakness. \nAttackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update\n2014-004\n\nOS X Mavericks 10.9.5 and Security Update 2014-004 are now available\nand address the following:\n\napache_mod_php\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in PHP 5.4.24\nDescription:  Multiple vulnerabilities existed in PHP 5.4.24, the\nmost serious of which may have led to arbitrary code execution. This\nupdate addresses the issues by updating PHP to version 5.4.30\nCVE-ID\nCVE-2013-7345\nCVE-2014-0185\nCVE-2014-0207\nCVE-2014-0237\nCVE-2014-0238\nCVE-2014-1943\nCVE-2014-2270\nCVE-2014-3478\nCVE-2014-3479\nCVE-2014-3480\nCVE-2014-3487\nCVE-2014-3515\nCVE-2014-3981\nCVE-2014-4049\n\nBluetooth\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of a\nBluetooth API call. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4390 : Ian Beer of Google Project Zero\n\nCoreGraphics\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or an information disclosure\nDescription:  An out of bounds memory read existed in the handling of\nPDF files. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nCoreGraphics\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  An integer overflow existed in the handling of PDF\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nFoundation\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  An application using NSXMLParser may be misused to disclose\ninformation\nDescription:  An XML External Entity issue existed in NSXMLParser's\nhandling of XML. This issue was addressed by not loading external\nentities across origins. \nCVE-ID\nCVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  Compiling untrusted GLSL shaders may lead to an unexpected\napplication termination or arbitrary code execution\nDescription:  A user-space buffer overflow existed in the shader\ncompiler. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4393 : Apple\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple validation issues existed in some integrated\ngraphics driver routines. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4394 : Ian Beer of Google Project Zero\nCVE-2014-4395 : Ian Beer of Google Project Zero\nCVE-2014-4396 : Ian Beer of Google Project Zero\nCVE-2014-4397 : Ian Beer of Google Project Zero\nCVE-2014-4398 : Ian Beer of Google Project Zero\nCVE-2014-4399 : Ian Beer of Google Project Zero\nCVE-2014-4400 : Ian Beer of Google Project Zero\nCVE-2014-4401 : Ian Beer of Google Project Zero\nCVE-2014-4416 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in the handling of\nIOKit API arguments. This issue was addressed through improved\nvalidation of IOKit API arguments. \nCVE-ID\nCVE-2014-4376 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOAcceleratorFamily function. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4402 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can read kernel pointers, which can be used to\nbypass kernel address space layout randomization\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOHIDFamily function. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-4379 : Ian Beer of Google Project Zero\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IODataQueue objects. This issue was addressed\nthrough improved validation of metadata. \nCVE-ID\nCVE-2014-4388 : @PanguTeam\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4389 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can infer kernel addresses and bypass kernel\naddress space layout randomization\nDescription:  In some cases, the CPU Global Descriptor Table was\nallocated at a predictable address. This issue was addressed through\nalways allocating the Global Descriptor Table at random addresses. \nCVE-ID\nCVE-2014-4403 : Ian Beer of Google Project Zero\n\nLibnotify\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with root privileges\nDescription:  An out-of-bounds write issue existed in Libnotify. This\nissue was addressed through improved bounds checking\nCVE-ID\nCVE-2014-4381 : Ian Beer of Google Project Zero\n\nOpenSSL\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in OpenSSL 0.9.8y, including one\nthat may lead to arbitrary code execution\nDescription:  Multiple vulnerabilities existed in OpenSSL 0.9.8y. \nThis update was addressed by updating OpenSSL to version 0.9.8za. \nCVE-ID\nCVE-2014-0076\nCVE-2014-0195\nCVE-2014-0221\nCVE-2014-0224\nCVE-2014-3470\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nRLE encoded movie files. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom\nGallagher & Paul Bates working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted MIDI file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the handling of MIDI\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nthe 'mvhd' atoms. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day\nInitiative\n\nruby\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A remote attacker may be able to cause arbitrary code\nexecution\nDescription:  A heap buffer overflow existed in LibYAML's handling of\npercent-encoded characters in a URI. This issue was addressed through\nimproved bounds checking. This update addresses the issues by\nupdating LibYAML to version 0.1.6\nCVE-ID\nCVE-2014-2525\n\n\nNote: OS X Mavericks 10.9.5 includes the security content of\nSafari 7.0.6: http://support.apple.com/kb/HT6367\n\nOS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nk4w2RKNm0Fv+kdNoFAnd\n=gpVc\n-----END PGP SIGNATURE-----\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04343424\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04343424\nVersion: 1\n\nHPSBGN03050 rev.1 - HP IceWall SSO Dfw and HP IceWall MCRP running OpenSSL,\nRemote Denial of Service (DoS), Code Execution, Security Restriction Bypass,\nDisclosure of Information, or Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-07-07\nLast Updated: 2014-07-07\n\nPotential Security Impact: Remote execution of arbitrary code\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP IceWall SSO\nDfw and HP IceWall MCRP running OpenSSL. The vulnerabilities could be\nexploited remotely to create a Denial of Service (DoS), execute code, allow\nunauthorized access, or disclose information. \n\nReferences:\n\nCVE-2014-0076 Remote Denial of Service (DoS)\nCVE-2014-0195 Remote Unauthorized Access\nCVE-2014-0221 Remote Denial of Service (DoS)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nCVE-2014-3470 Remote Code Execution or Unauthorized Access\nSSRT101609\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP IceWall SSO Dfw v8.0, v8.0 R1, v8.0 R2, v8.0 R3, and v10.0\nHP IceWall SSO Certd v8.0 R3\nHP IceWall SSO Dfw Certd v10.0\nHP IceWall SSO Agent Option v8.0 2007 and v10.0 (CVE-2014-0076 only)\nHP IceWall MCRP v2.1 and v3.0\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP recommends the following software update options to resolve these\nvulnerabilities. \n\nFor HP IceWall products which bundle OpenSSL, an OpenSSL software update is\navailable at the following location:\n\nhttp://www.hp.com/jp/icewall_patchaccess\n\nFor RHEL, apply RHEL's OpenSSL patch:\n\nhttps://access.redhat.com/site/articles/904433\n\nNote: CVE-2014-0076 is not impacted on RHEL\n\nhttps://access.redhat.com/security/cve/CVE-2014-0076\n\nFor HP-UX, apply HP-UX OpenSSL update as referenced in the following HP\nSecurity Bulletin HPSBUX03046 :\n\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_n\na-c04336637\n\nHP recommends the following mitigation information to protect against\npotential risk for the following HP IceWall products. \n\nHP IceWall SSO Dfw and MCRP\n\nIf possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to\nuse SSL/TLS for back-end web server connection. \n\nHP IceWall SSO Dfw Certd\n\nIf possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS\non any connection with LDAP server. \n\nNote: The HP IceWall product is only available in Japan. \n\nHISTORY\nVersion:1 (rev.1) - 7 July 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \nHP Version Control Repository Manager (VCRM) version 7.3.3 and earlier for\nLinux and Windows. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities \n\nEMC Identifier: ESA-2014-079\n\nCVE Identifier:  See below for individual CVEs\n\nSeverity Rating: CVSS v2 Base Score:  See below for individual CVSS score for each CVE\n\nAffected products:  \n\\x95\tAll EMC Documentum Content Server versions of 7.1 prior to P07\n\\x95\tAll EMC Documentum Content Server versions of 7.0\n\\x95\tAll EMC Documentum Content Server versions of 6.7 SP2 prior to P16\n\\x95\tAll EMC Documentum Content Server versions of 6.7 SP1\n\\x95\tAll EMC Documentum Content Server versions prior to 6.7 SP1\n \nSummary:  \nEMC Documentum Content Server contains fixes for multiple vulnerabilities which also include vulnerabilities disclosed by the OpenSSL project on June 5, 2014 in OpenSSL. \n\nDetails: \nEMC Documentum Content Server may be susceptible to the following vulnerabilities:\n\n\\x95\tArbitrary Code Execution (CVE-2014-4618):\nAuthenticated non-privileged users can potentially execute Documentum methods with higher level privileges (up to and including superuser privileges) due to improper authorization checks being performed on user-created system objects. \nCVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)\n\n\\x95\tDQL Injection (CVE-2014-2520):\nCertain DQL hints in EMC Documentum Content Server may be potentially exploited by an authenticated non-privileged malicious user to conduct DQL injection attacks and read the database contents. This issue only affects Content Server running on Oracle database. \nCVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)\n\n\\x95\tInformation Disclosure (CVE-2014-2521):\nAuthenticated non-privileged users are allowed to retrieve meta-data of unauthorized system objects due to improper authorization checks being performed on certain RPC commands in Content Server. \nCVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)\n\n\\x95\tMultiple OpenSSL vulnerabilities (See individual CVEs below and refer to NVD for each of their scores):\n\tSSL/TLS Man-in-the-middle (MITM) vulnerability (CVE-2014-0224)\n\tDTLS recursion flaw  (CVE-2014-0221)\n\tDTLS invalid fragment vulnerability (CVE-2014-0195)\n\tSSL_MODE_RELEASE_BUFFERS NULL pointer deference  (CVE-2014-0198)\n\tSSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)\n\tAnonymous ECDH denial of service (CVE-2014-3470)\n\tFLUSH + RELOAD cache side-channel attack (CVE-2014-0076)\nFor more information about these vulnerabilities, please visit the original OpenSSL advisory https://www.openssl.org/news/secadv_20140605.txt   \n\nResolution: \nThe following versions contain the resolution for these issues: \n\\x95\tEMC Documentum Content Server version 7.1 P07 and later\n\\x95\tEMC Documentum Content Server version 7.0: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \n\\x95\tEMC Documentum Content Server version 6.7 SP2 P16 and later\n\\x95\tEMC Documentum Content Server version 6.7 SP1: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \n\nEMC recommends all customers to upgrade to one of the above versions at the earliest opportunity. \n\nLink to remedies:\nRegistered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/downloads/2732_Documentum-Server\n\nFor Hotfix, contact EMC Support. \n\n\n\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. \n\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nEMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n\nHP Systems Insight Manager v7.3 Hotfix kit\nHP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager\nv7.2 Hotfix kit is currently unavailable, but will be released at a later\ndate. \n\nhttp://h18013.www1.hp.com/products/servers/management/hpsim/download.html\n\nNOTE: No reboot of the system is required after applying the HP SIM Hotfix\nkit. These vulnerabilities include: \n\n* The SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"POODLE\", which could be exploited remotely\nresulting in disclosure of information. \n\n  - HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2010-5298\n      4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\n      4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)\n\n    CVE-2014-0076\n      4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n      1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2014-0195\n      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-0198\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0221\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0224\n      6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-3470\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-3566\n      3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\n      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2016-0705\n      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE recommends applying the following software updates to resolve the\nvulnerabilities in the impacted versions of HPE StoreVirtual products running\nHPE LeftHand OS. \n\nLeftHand OS v11.5 - Patches 45019-00 and 45020 \nLeftHand OS v12.0 - Patches 50016-00 and 50017-00 \nLeftHand OS v12.5 - Patch 55016-00 \nLeftHand OS v12.6 - Patch 56002-00 \n\n**Notes:**\n\nThese patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision\nto OpenSSL v1.0.1e 48. \nThese patches migrate Certificate Authority Hashing Algorithm from a weak\nhashing algorithm SHA1 to the stronger hashing algorithm SHA256. ============================================================================\nUbuntu Security Notice USN-2165-1\nApril 07, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 13.10\n- Ubuntu 12.10\n- Ubuntu 12.04 LTS\n\nSummary:\n\nOpenSSL could be made to expose sensitive information over the network,\npossibly including private keys. An\nattacker could use this issue to perform side-channel attacks and possibly\nrecover ECDSA nonces. (CVE-2014-0076)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 13.10:\n  libssl1.0.0                     1.0.1e-3ubuntu1.2\n\nUbuntu 12.10:\n  libssl1.0.0                     1.0.1c-3ubuntu2.7\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.12\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. Since this issue may have resulted in compromised\nprivate keys, it is recommended to regenerate them. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2165-1\n  CVE-2014-0076, CVE-2014-0160\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.2\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.7\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.12\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-14:06.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          OpenSSL multiple vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2014-04-08\nAffects:        All supported versions of FreeBSD. \nCorrected:      2014-04-08 18:27:39 UTC (stable/10, 10.0-STABLE)\n                2014-04-08 18:27:46 UTC (releng/10.0, 10.0-RELEASE-p1)\n                2014-04-08 23:16:19 UTC (stable/9, 9.2-STABLE)\n                2014-04-08 23:16:05 UTC (releng/9.2, 9.2-RELEASE-p4)\n                2014-04-08 23:16:05 UTC (releng/9.1, 9.1-RELEASE-p11)\n                2014-04-08 23:16:19 UTC (stable/8, 8.4-STABLE)\n                2014-04-08 23:16:05 UTC (releng/8.4, 8.4-RELEASE-p8)\n                2014-04-08 23:16:05 UTC (releng/8.3, 8.3-RELEASE-p15)\nCVE Name:       CVE-2014-0076, CVE-2014-0160\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>. \n\n0.   Revision History\n\nv1.0  2014-04-08 Initial release. \nv1.1  2014-04-08 Added patch applying step in Solutions section. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nThe Heartbeat Extension provides a new protocol for TLS/DTLS allowing the\nusage of keep-alive functionality without performing a renegotiation and a\nbasis for path MTU (PMTU) discovery for DTLS. \n\nElliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the\nDigital Signature Algorithm (DSA) which uses Elliptic Curve Cryptography. \nOpenSSL uses the Montgomery Ladder Approach to compute scalar multiplication\nin a fixed amount of time, which does not leak any information through timing\nor power. \n\nII.  Problem Description\n\nThe code used to handle the Heartbeat Extension does not do sufficient boundary\nchecks on record length, which allows reading beyond the actual payload. \n[CVE-2014-0160].  Affects FreeBSD 10.0 only. \n\nA flaw in the implementation of Montgomery Ladder Approach would create a\nside-channel that leaks sensitive timing information. [CVE-2014-0076]\n\nIII. Impact\n\nAn attacker who can send a specifically crafted packet to TLS server or client\nwith an established connection can reveal up to 64k of memory of the remote\nsystem.  Such memory might contain sensitive information, including key\nmaterial, protected content, etc. which could be directly useful, or might\nbe leveraged to obtain elevated privileges.  [CVE-2014-0160]\n\nA local attacker might be able to snoop a signing process and might recover\nthe signing key from it.  [CVE-2014-0076]\n\nIV.  Workaround\n\nNo workaround is available, but systems that do not use OpenSSL to implement\nthe Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)\nprotocols implementation and do not use the ECDSA implementation from OpenSSL\nare not vulnerable. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 8.x and FreeBSD 9.x]\n# fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch.asc\n# gpg --verify openssl.patch.asc\n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch.asc\n# gpg --verify openssl-10.patch.asc\n\nb) Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nRecompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nIMPORTANT: the update procedure above does not update OpenSSL from the\nPorts Collection or from a package, known as security/openssl, which\nhas to be updated separately via ports or package. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r264285\nreleng/8.3/                                                       r264284\nreleng/8.4/                                                       r264284\nstable/9/                                                         r264285\nreleng/9.1/                                                       r264284\nreleng/9.2/                                                       r264284\nstable/10/                                                        r264266\nreleng/10.0/                                                      r264267\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076>\n<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160>\n\n<URL:http://www.openssl.org/news/secadv_20140407.txt>\n<URL:http://eprint.iacr.org/2014/140.pdf>\n\nThe latest revision of this advisory is available at\n<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-14:06.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.22 (FreeBSD)\n\niQIcBAEBCgAGBQJTRJySAAoJEO1n7NZdz2rnzPcQALd6So7vDRBaYiaGwQjc55oI\nQwTnNzkkgxVTGwi8lDV6h8bIW3Ga8AhMGoZCVOeKbDABBDghVYe6Na5e/wsHbPPu\ntXmDRhoi2aV0sVCTFfpoCNJ8l2lb+5vnmEC6Oi3PMQDbRC+Ptg15o0W/2hXw0eKO\nyu4BhS4dl6lX7IvlR1n4sr0rfa8vwxe5OpUUd6Bzw0SUBmV+BTzq1C70FuOZ/hnD\nThaZS8Ox3fcWuPylhPbhxnWqg0oVNkBpiRYpIBadrpl9EiRRzbTfF+uFvauR9tBN\n1mK8lLwd7DK6x8iCSnDd2ZlN1rNn8EPsGohT4vP+szz2E2YP1x8ugihEBdYax+Dh\nZ4TWkm3/wJwEf00G32E1hZ8F+UavE8AmnGVk6gxiRpnv2sdNJYRlWd9O8u251qMq\nuzcmBX6Jr14dQCwlqof8pYKYV7VCE/Cu4JHThOCL042CLwUmXyJVMFzm6WPQlNjC\ndlPbSG+PXjninPjcYBoMR+863X35Guv0pJBNG/ofEh+Jy5MveaMRQX/mA+wy29zm\nqg74lM07adXkJujPAuA5dYjZivpW1NPOHeIjaYjaI6KDw2q3BlkGa2C3PeYDQxn4\nIqujqpem5nyQY4BO2XC8gVtuym0jDSA98bgFXumNDkmzlUUuOFOWD8YScLopOzOu\nEpUXgezogk1Rd3EVsaJ+\n=UBO0\n-----END PGP SIGNATURE-----\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
         {
            db: "BID",
            id: "66363",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "126045",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "126097",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0076",
            trust: 2.3,
         },
         {
            db: "BID",
            id: "66363",
            trust: 1.4,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.4,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59364",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59040",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59495",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59374",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59175",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59454",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59445",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59264",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58492",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58727",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59438",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.4,
         },
         {
            db: "MCAFEE",
            id: "SB10071",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-0076",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128315",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127386",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127266",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127923",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127608",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140720",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126045",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128001",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126097",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            db: "BID",
            id: "66363",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "126045",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "126097",
         },
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   id: "VAR-201403-0514",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4135385684999999,
   },
   last_update_date: "2024-11-29T19:32:10.327000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Debian Security Advisories: DSA-2908-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=438bf64e25a46a5ac11098b5720d1bb6",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2165-1",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0076",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=1fc1fc75c3cab4aa04eb437a09a1da4f",
         },
         {
            title: "Red Hat: CVE-2014-0076",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0076",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/uvhw/uvhw.bitcoin.js ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/second-nsa-crypto-tool-found-in-rsa-bsafe/105143/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.5,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 1.4,
            url: "http://eprint.iacr.org/2014/140",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.4,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/66363",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-2165-1",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.novell.com/show_bug.cgi?id=869945",
         },
         {
            trust: 1.1,
            url: "https://bugs.gentoo.org/show_bug.cgi?id=505278",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59438",
         },
         {
            trust: 1.1,
            url: "http://advisories.mageia.org/mgasa-2014-0165.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:067",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676424",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58727",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015300",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59495",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015264",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/kb/ht6443",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59454",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59445",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59374",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59364",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59264",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59175",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59040",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58492",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html",
         },
         {
            trust: 1.1,
            url: "http://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=2198be3483259de374f91e57d247d0fc667aef29",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.4,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0076_cryptographic_issues",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list&showdraft=false",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095202",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095218",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas3bf6e25d1260a4de686257cc100631528",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas3824bd213d0f7c3d086257cc10063152c",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl5",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_aix_is_affected_by_a_vulnerability_in_openssl_cve_2014_0160?lang=en_us",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095187",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670738",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095124",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004581",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004611",
         },
         {
            trust: 0.3,
            url: "http://www.freebsd.org/security/advisories/freebsd-sa-14:06.openssl.asc",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020681",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037392",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037189",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037307",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671096",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676673",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671128",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671127",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670640",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21670640",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671100",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671098",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670316",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037451",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10071",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/33a01-5228bdf5d027e/cert_security_mini-_bulletin_xrx15ao_for_cq8570-cq8870_v1-0.pdf",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15295.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020021",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670401",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037382",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037384",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670905",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037379",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037381",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037383",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037393",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21670165",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004582",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095143",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095144",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020038",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671197",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682023",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670301",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670302",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670576",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682026",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682024",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21669859",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004616",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095841",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095217",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673715",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670339",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095203",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21688949",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678668",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676424",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676092",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695392",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21681249",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21671133",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004608",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020694",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670560",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670858",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673696",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095066",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004615",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21669664",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100179859",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100179858",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2014-0076",
         },
         {
            trust: 0.2,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.2,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/310.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/uvhw/uvhw.bitcoin.js",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://threatpost.com/second-nsa-crypto-tool-found-in-rsa-bsafe/105143/",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=33767",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2165-1/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4378",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4379",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0238",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1943",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4376",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-7345",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4377",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4350",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4381",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2525",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0237",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3480",
         },
         {
            trust: 0.1,
            url: "http://www.vsecurity.com/)",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2270",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0207",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3515",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht6367",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3479",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3478",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4049",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4374",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3981",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall_patchaccess",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-2c54f23c6dbc4d598e86fdef95",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-4480df0f6d544779b0143f5c3b",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4618",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2520",
         },
         {
            trust: 0.1,
            url: "https://support.emc.com/downloads/2732_documentum-server",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2521",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://www.hpe.com/info/report-security-vulnerability",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.12",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.7",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:06/openssl.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:06/openssl-10.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://eprint.iacr.org/2014/140.pdf>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:06.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://www.openssl.org/news/secadv_20140407.txt>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:06/openssl-10.patch",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:06/openssl.patch",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            db: "BID",
            id: "66363",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "126045",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "126097",
         },
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            db: "BID",
            id: "66363",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "126045",
         },
         {
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            db: "PACKETSTORM",
            id: "126097",
         },
         {
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-03-25T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            date: "2014-02-24T00:00:00",
            db: "BID",
            id: "66363",
         },
         {
            date: "2014-09-19T15:26:13",
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            date: "2014-07-09T04:03:23",
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            date: "2014-06-27T18:43:56",
            db: "PACKETSTORM",
            id: "127266",
         },
         {
            date: "2014-08-19T16:52:04",
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            date: "2014-07-24T23:48:05",
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            date: "2017-01-25T21:54:44",
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            date: "2014-04-07T22:44:13",
            db: "PACKETSTORM",
            id: "126045",
         },
         {
            date: "2014-08-26T11:11:00",
            db: "PACKETSTORM",
            id: "128001",
         },
         {
            date: "2014-04-09T23:30:40",
            db: "PACKETSTORM",
            id: "126097",
         },
         {
            date: "2014-03-25T13:25:21.977000",
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-02-13T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0076",
         },
         {
            date: "2017-05-23T16:25:00",
            db: "BID",
            id: "66363",
         },
         {
            date: "2024-11-21T02:01:18.587000",
            db: "NVD",
            id: "CVE-2014-0076",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "66363",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL CVE-2014-0076 Information Disclosure Weakness",
      sources: [
         {
            db: "BID",
            id: "66363",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "66363",
         },
      ],
      trust: 0.3,
   },
}

var-202010-1438
Vulnerability from variot

IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933. Vendor is responsible for this vulnerability IBM X-Force ID: 183933 Is published as.Information may be obtained and information may be tampered with. The software supports secure integration of complex B2B processes with diverse partner communities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1438",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "gte",
            trust: 1,
            vendor: "ibm",
            version: "2.2.0.0",
         },
         {
            model: "sterling file gateway",
            scope: "lte",
            trust: 1,
            vendor: "ibm",
            version: "6.0.3.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "gte",
            trust: 1,
            vendor: "ibm",
            version: "5.2.0.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "lte",
            trust: 1,
            vendor: "ibm",
            version: "6.0.3.1",
         },
         {
            model: "sterling b2b integrator",
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.2.0.0  to  6.0.3.1",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   cve: "CVE-2020-4564",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2020-4564",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-182689",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "psirt@us.ibm.com",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.3,
                  id: "CVE-2020-4564",
                  impactScore: 2.7,
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  trust: 1.8,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.3,
                  id: "CVE-2020-4564",
                  impactScore: 2.7,
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-4564",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "psirt@us.ibm.com",
                  id: "CVE-2020-4564",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-4564",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202010-903",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-182689",
                  trust: 0.1,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-4564",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933. Vendor is responsible for this vulnerability IBM X-Force ID: 183933 Is published as.Information may be obtained and information may be tampered with. The software supports secure integration of complex B2B processes with diverse partner communities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
         },
      ],
      trust: 1.8,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-4564",
            trust: 2.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
            trust: 0.7,
         },
         {
            db: "NSFOCUS",
            id: "49872",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-182689",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   id: "VAR-202010-1438",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:33:16.177000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "ibm-sterling-cve20204564-xss (183933)",
            trust: 0.8,
            url: "https://www.ibm.com/support/pages/node/6349533",
         },
         {
            title: "IBM Sterling B2B Integrator Fixes for cross-site scripting vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131427",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.1,
         },
         {
            problemtype: "Cross-site scripting (CWE-79) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.9,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/183933",
         },
         {
            trust: 1.8,
            url: "https://www.ibm.com/support/pages/node/6349533",
         },
         {
            trust: 1.8,
            url: "https://www.ibm.com/support/pages/node/6349539",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-4564",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/blogs/psirt/security-bulletin-cross-site-scripting-security-vulnerability-affects-ibm-sterling-b2b-integrator-standard-edition-cve-2020-4564/",
         },
         {
            trust: 0.6,
            url: "http://www.nsfocus.net/vulndb/49872",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/79.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-10-20T00:00:00",
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            date: "2020-10-20T00:00:00",
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            date: "2021-05-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            date: "2020-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            date: "2020-10-20T15:15:13.060000",
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-10-22T00:00:00",
            db: "VULHUB",
            id: "VHN-182689",
         },
         {
            date: "2020-10-22T00:00:00",
            db: "VULMON",
            id: "CVE-2020-4564",
         },
         {
            date: "2021-05-07T09:01:00",
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
         {
            date: "2020-10-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
         {
            date: "2024-11-21T05:32:54.657000",
            db: "NVD",
            id: "CVE-2020-4564",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator Standard Edition  and  Sterling File Gateway  Cross-site Scripting Vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-012450",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202010-903",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0072
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. Multiple IBM product are prone to an arbitrary file-upload vulnerability. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0072",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60987",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-2982",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-2982",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-62984",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-2982",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-2982",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-059",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-62984",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors. Multiple IBM product are prone to an arbitrary file-upload vulnerability. \nAn attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "BID",
            id: "60987",
         },
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-2982",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "83997",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60987",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-62984",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            db: "BID",
            id: "60987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   id: "VAR-201307-0072",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:34:27.383000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/83997",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2982",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2982",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/83997",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            db: "BID",
            id: "60987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            db: "BID",
            id: "60987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60987",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            date: "2013-07-03T13:54:31.070000",
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-62984",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60987",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
         {
            date: "2017-08-29T01:33:18.713000",
            db: "NVD",
            id: "CVE-2013-2982",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to uploading arbitrary files",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003205",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-059",
         },
      ],
      trust: 0.6,
   },
}

var-201312-0176
Vulnerability from variot

IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation. Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to bypass authentication

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0176",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64448",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5413",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2013-5413",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-65415",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5413",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5413",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-448",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65415",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 do not invalidate a session upon a logout action, which allows remote attackers to bypass authentication by leveraging an unattended workstation. \nLocal attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to bypass authentication",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "BID",
            id: "64448",
         },
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5413",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "87362",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "20135413",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC96051",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "64448",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-65415",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            db: "BID",
            id: "64448",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   id: "VAR-201312-0176",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T23:09:55.100000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC96051",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96051",
         },
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            title: "SI_BUILD_5020401",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47224",
         },
         {
            title: "CXSI5204",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47223",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96051",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87362",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5413",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5413",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87362",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            db: "BID",
            id: "64448",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64448",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            date: "2013-12-21T14:22:57.003000",
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65415",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64448",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
         {
            date: "2024-11-21T01:57:26.140000",
            db: "NVD",
            id: "CVE-2013-5413",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerabilities that bypass authentication",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005677",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-448",
         },
      ],
      trust: 0.6,
   },
}

var-201406-0142
Vulnerability from variot

The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8za,1.0.0m and 1.0.1h are vulnerable. These vulnerabilities include:

  • The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information.

  • HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5

  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2010-5298
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)

CVE-2014-0076
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2014-0195
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-0198
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0221
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0224
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-3470
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-3566
  3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the following software updates to resolve the vulnerabilities in the impacted versions of HPE StoreVirtual products running HPE LeftHand OS.

LeftHand OS v11.5 - Patches 45019-00 and 45020 LeftHand OS v12.0 - Patches 50016-00 and 50017-00 LeftHand OS v12.5 - Patch 55016-00 LeftHand OS v12.6 - Patch 56002-00

Notes:

These patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision to OpenSSL v1.0.1e 48. These patches migrate Certificate Authority Hashing Algorithm from a weak hashing algorithm SHA1 to the stronger hashing algorithm SHA256.

In addition this update disables ZLIB compress by default. If you need to re-enable it for some reason, you can set the environment variable OPENSSL_NO_DEFAULT_ZLIB.

This update also fixes a header declaration which could result in build failures in applications using OpenSSL.

For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u11. OpenSSL is a 3rd party product that is embedded with some HP Software products. This bulletin notifies HP Software customers about products affected by the OpenSSL vulnerabilities

Note: OpenSSL vulnerabilities, are vulnerabilities found in the OpenSSL product cryptographic software library product. This weakness potentially allows Man in the Middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The impacted products appear in the list below are vulnerable due to embedding of OpenSSL standard release software.

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://www.openssl.org/news/secadv_20140605.txt


Updated Packages:

Mandriva Enterprise Server 5: ef1687f8f4d68dd34149dbb04f3fccda mes5/i586/libopenssl0.9.8-0.9.8h-3.18mdvmes5.2.i586.rpm 3e46ee354bd0add0234eaf873f0a076c mes5/i586/libopenssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.i586.rpm 0cc60393474d11a3786965d780e39ebc mes5/i586/libopenssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.i586.rpm 16d367fe394b2f16b9f022ea7ba75a54 mes5/i586/openssl-0.9.8h-3.18mdvmes5.2.i586.rpm 223a4a6b80f1b2eb3cbfaf99473423f3 mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64: 85a51b41a45f6905ea778347d8b236c1 mes5/x86_64/lib64openssl0.9.8-0.9.8h-3.18mdvmes5.2.x86_64.rpm d0bf9ef6c6e33d0c6158add14cbe04b8 mes5/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm 707842b93162409157667f696996f4fc mes5/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm 70f4de1608d99c970afa1786595a761d mes5/x86_64/openssl-0.9.8h-3.18mdvmes5.2.x86_64.rpm 223a4a6b80f1b2eb3cbfaf99473423f3 mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.

It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-0221, CVE-2014-3505, CVE-2014-3506)

A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange.

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-0.9.8e-27.el5_10.4.i386.rpm openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-perl-0.9.8e-27.el5_10.4.i386.rpm

x86_64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.x86_64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm

Red Hat Enterprise Linux Desktop Workstation (v. 5 client):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm

x86_64: openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source: openssl-0.9.8e-27.el5_10.4.src.rpm

i386: openssl-0.9.8e-27.el5_10.4.i386.rpm openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-perl-0.9.8e-27.el5_10.4.i386.rpm

ia64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.ia64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ia64.rpm openssl-devel-0.9.8e-27.el5_10.4.ia64.rpm openssl-perl-0.9.8e-27.el5_10.4.ia64.rpm

ppc: openssl-0.9.8e-27.el5_10.4.ppc.rpm openssl-0.9.8e-27.el5_10.4.ppc64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ppc.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.ppc64.rpm openssl-devel-0.9.8e-27.el5_10.4.ppc.rpm openssl-devel-0.9.8e-27.el5_10.4.ppc64.rpm openssl-perl-0.9.8e-27.el5_10.4.ppc.rpm

s390x: openssl-0.9.8e-27.el5_10.4.s390.rpm openssl-0.9.8e-27.el5_10.4.s390x.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.s390.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.s390x.rpm openssl-devel-0.9.8e-27.el5_10.4.s390.rpm openssl-devel-0.9.8e-27.el5_10.4.s390x.rpm openssl-perl-0.9.8e-27.el5_10.4.s390x.rpm

x86_64: openssl-0.9.8e-27.el5_10.4.i686.rpm openssl-0.9.8e-27.el5_10.4.x86_64.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm openssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm openssl-devel-0.9.8e-27.el5_10.4.i386.rpm openssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm openssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

ESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities

EMC Identifier: ESA-2014-079

CVE Identifier: See below for individual CVEs

Severity Rating: CVSS v2 Base Score: See below for individual CVSS score for each CVE

Affected products:
\x95 All EMC Documentum Content Server versions of 7.1 prior to P07 \x95 All EMC Documentum Content Server versions of 7.0 \x95 All EMC Documentum Content Server versions of 6.7 SP2 prior to P16 \x95 All EMC Documentum Content Server versions of 6.7 SP1 \x95 All EMC Documentum Content Server versions prior to 6.7 SP1

Summary:
EMC Documentum Content Server contains fixes for multiple vulnerabilities which also include vulnerabilities disclosed by the OpenSSL project on June 5, 2014 in OpenSSL.

Details: EMC Documentum Content Server may be susceptible to the following vulnerabilities:

\x95 Arbitrary Code Execution (CVE-2014-4618): Authenticated non-privileged users can potentially execute Documentum methods with higher level privileges (up to and including superuser privileges) due to improper authorization checks being performed on user-created system objects. CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

\x95 DQL Injection (CVE-2014-2520): Certain DQL hints in EMC Documentum Content Server may be potentially exploited by an authenticated non-privileged malicious user to conduct DQL injection attacks and read the database contents. This issue only affects Content Server running on Oracle database. CVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)

\x95 Information Disclosure (CVE-2014-2521): Authenticated non-privileged users are allowed to retrieve meta-data of unauthorized system objects due to improper authorization checks being performed on certain RPC commands in Content Server. CVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)

\x95 Multiple OpenSSL vulnerabilities (See individual CVEs below and refer to NVD for each of their scores): SSL/TLS Man-in-the-middle (MITM) vulnerability (CVE-2014-0224) DTLS recursion flaw (CVE-2014-0221) DTLS invalid fragment vulnerability (CVE-2014-0195) SSL_MODE_RELEASE_BUFFERS NULL pointer deference (CVE-2014-0198) SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298) Anonymous ECDH denial of service (CVE-2014-3470) FLUSH + RELOAD cache side-channel attack (CVE-2014-0076) For more information about these vulnerabilities, please visit the original OpenSSL advisory https://www.openssl.org/news/secadv_20140605.txt

Resolution: The following versions contain the resolution for these issues: \x95 EMC Documentum Content Server version 7.1 P07 and later \x95 EMC Documentum Content Server version 7.0: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \x95 EMC Documentum Content Server version 6.7 SP2 P16 and later \x95 EMC Documentum Content Server version 6.7 SP1: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests.

EMC recommends all customers to upgrade to one of the above versions at the earliest opportunity.

Link to remedies: Registered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/downloads/2732_Documentum-Server

For Hotfix, contact EMC Support.

Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. HP System Management Homepage versions 7.3.2 and earlier for Linux and Windows. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update Advisory ID: RHSA-2014:1021-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1021.html Issue date: 2014-08-06 CVE Names: CVE-2014-0118 CVE-2014-0193 CVE-2014-0221 CVE-2014-0226 CVE-2014-0231 CVE-2014-3472 =====================================================================

  1. Summary:

Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.3.0 and fix multiple security issues, several bugs, and add various enhancements are now available from the Red Hat Customer Portal.

The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Description:

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.

A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226)

A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118)

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. (CVE-2014-0221)

Note: This update provides a fix for the CVE-2014-0221 issue in openssl packages for Solaris, HP-UX, and Microsoft Windows.

A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231)

A flaw was found in the WebSocket08FrameDecoder implementation that could allow a remote attacker to trigger an Out Of Memory Exception by issuing a series of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on the server configuration, this could lead to a denial of service. (CVE-2014-0193)

It was found that the isCallerInRole() method of the SimpleSecurityManager did not correctly check caller roles. A remote, authenticated attacker could use this flaw to circumvent the caller check in applications that use black list access control based on caller roles. (CVE-2014-3472)

Red Hat would like to thank the OpenSSL project for reporting CVE-2014-0221; upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue. Red Hat would also like to thank James Roper of Typesafe for reporting CVE-2014-0193, and CA Technologies for reporting CVE-2014-3472.

This release of JBoss Enterprise Application Platform also includes bug fixes and enhancements. Documentation for these changes will be available shortly from the JBoss Enterprise Application Platform 6.3.0 Release Notes, linked to in the References.

All users of Red Hat JBoss Enterprise Application Platform 6.2 as provided from the Red Hat Customer Portal are advised to apply this update. The JBoss server process must be restarted for the update to take effect.

  1. Solution:

The References section of this erratum contains a download link (you must log in to download the update). Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1092783 - CVE-2014-0193 netty: DoS via memory exhaustion during data aggregation 1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake 1103815 - CVE-2014-3472 JBoss AS Security: Invalid EJB caller role check implementation 1120596 - CVE-2014-0231 httpd: mod_cgid denial of service 1120601 - CVE-2014-0118 httpd: mod_deflate denial of service 1120603 - CVE-2014-0226 httpd: mod_status heap-based buffer overflow

  1. References:

https://www.redhat.com/security/data/cve/CVE-2014-0118.html https://www.redhat.com/security/data/cve/CVE-2014-0193.html https://www.redhat.com/security/data/cve/CVE-2014-0221.html https://www.redhat.com/security/data/cve/CVE-2014-0226.html https://www.redhat.com/security/data/cve/CVE-2014-0231.html https://www.redhat.com/security/data/cve/CVE-2014-3472.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=distributions&version=6.3 https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.3/html/6.3.0_Release_Notes/index.html

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFT4mHwXlSAg2UNWIIRAthTAJ94pKdbkn56I+qIvIgz1YJ7QgsuiwCgoSHE aywT1TARdEOozkGd3dp3miw= =izby -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04378799

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04378799 Version: 1

HPSBMU03074 rev.1 - HP Insight Control server migration on Linux and Windows running OpenSSL, Remote Denial of Service (DoS), Code Execution, Unauthorized Access, Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-07-23 Last Updated: 2014-07-23

Potential Security Impact: Remote denial of service (DoS), code execution, unauthorized access, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control server migration running on Linux and Windows which could be exploited remotely resulting in denial of service (DoS), code execution, unauthorized access, or disclosure of information.

References:

CVE-2010-5298 Remote Denial of Service CVE-2014-0076 Unauthorized Disclosure of Information CVE-2014-0195 Remote Unauthorized Access CVE-2014-0198 Remote Denial of Service CVE-2014-0221 Remote Denial of Service (DoS) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information CVE-2014-3470 Remote Code Execution or Unauthorized Access SSRT101647

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server migration v7.2.2, v7.3, v7.3.1, and v7.3.2

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to v7.3.2 of HP Insight Control server migration to resolve these vulnerabilities by upgrading to version 7.3.3. Please note that version 7.3.3 of HP Insight Control server migration is included on the HP Insight Management 7.3 Update 2 DVD.

HP has provided the installation binaries for download from the following web site by using the Receive for free option:

http://h18013.www1.hp.com/products/servers/management/fpdownload.html

Customers using HP Insight Control server migration v7.2.2 must first upgrade from v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then upgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD.

Customers running HP Insight Control server migration v7.3, v7.3.1, or v7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to complete the upgrade.

For more information on the upgrade process, please refer to the HP Insight Management Installation and Upgrade Guide and Release notes, which are available at the following location:

http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind ex.aspx?cat=insightmanagement

NOTE: The upgrade paths described above update the entire HP Insight Control software stack. To upgrade HP Insight Control server migration only, complete the following steps:

Copy "hpsmp.exe" to the local machine from the HP Insight Management v7.3.0 Update 2 DVD ISO. Create batch file with the following commands: @echo off hpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch Copy the batch file to the folder where "hpsmp.exe" normally resides on the target system. Double click on the batch file. The HP Insight Control server migration installation starts in a command prompt. The command prompt closes when the installation finishes. After the installation completes it creates a log file (ICmigr.log) and an output file (ICmigroutput.xml) on the target system. Do not close or click on the command prompt while the process is completing. Do not run the command prompt in the background.

HISTORY Version:1 (rev.1) - 23 July 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

HP IceWall SSO Dfw and MCRP

If possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to use SSL/TLS for back-end web server connection.

HP IceWall SSO Dfw Certd

If possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS on any connection with LDAP server.

Note: The HP IceWall product is only available in Japan. ============================================================================ Ubuntu Security Notice USN-2232-4 August 18, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS

Summary:

USN-2232-1 introduced a regression in OpenSSL. One of the patch backports for Ubuntu 10.04 LTS caused a regression for certain applications. This update fixes the problem.

We apologize for the inconvenience. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-3470)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.21

After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

APPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update 2014-004

OS X Mavericks 10.9.5 and Security Update 2014-004 are now available and address the following:

apache_mod_php Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in PHP 5.4.24 Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30 CVE-ID CVE-2013-7345 CVE-2014-0185 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-3981 CVE-2014-4049

Bluetooth Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4390 : Ian Beer of Google Project Zero

CoreGraphics Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

CoreGraphics Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

Foundation Available for: OS X Mavericks 10.9 to 10.9.4 Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4393 : Apple

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-4394 : Ian Beer of Google Project Zero CVE-2014-4395 : Ian Beer of Google Project Zero CVE-2014-4396 : Ian Beer of Google Project Zero CVE-2014-4397 : Ian Beer of Google Project Zero CVE-2014-4398 : Ian Beer of Google Project Zero CVE-2014-4399 : Ian Beer of Google Project Zero CVE-2014-4400 : Ian Beer of Google Project Zero CVE-2014-4401 : Ian Beer of Google Project Zero CVE-2014-4416 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4376 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4402 : Ian Beer of Google Project Zero

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4379 : Ian Beer of Google Project Zero

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4388 : @PanguTeam

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses. CVE-ID CVE-2014-4403 : Ian Beer of Google Project Zero

Libnotify Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking CVE-ID CVE-2014-4381 : Ian Beer of Google Project Zero

OpenSSL Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. This update was addressed by updating OpenSSL to version 0.9.8za. CVE-ID CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

ruby Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A remote attacker may be able to cause arbitrary code execution Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6 CVE-ID CVE-2014-2525

Note: OS X Mavericks 10.9.5 includes the security content of Safari 7.0.6: http://support.apple.com/kb/HT6367

OS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJUGkP0AAoJEBcWfLTuOo7tygQP/1vHYXtWy6492Tjj6ycymWa+ Ct0eCCBU/AUi5ODNDeV9ddWkuFeXKbgQSHoPU19IPcIBAKnYUupVJSJ/cEHfSthh CiROjJw8Bt8comn04BgggHieLveN1xQCXQDcO29kBIpQr394XKS0lNXP//Z0oG5V sCnEDPz/0R92mwT5XkKD9WC7G/WjybS5V7BjEbdzDOn4qdTVje05xI5pof+fkeQ1 hFHo7uTCDkSzLH2YxrQHifNVyItz8AgnNHwH7zc6XmNtiNFkiFP/KU6BYyr8WiTQ Jb3pyLB/Xvmbd0kuETnDNvV0oJc88G38a++xZPnuM7zQrW/TQkkKQpiqKtYAiJuw ZhUoky620/7HULegcYtsTyuDFyEN6whdSmHLFCJzk2oZXZ7MPA8ywCFB8Y79rohW 5MTe/zVUSxxYBgVXpkmhPwXYSTINeUJGJA1RQtXhC2Hh6O2jeqJP2H0hTmgsCBRA 3X/2CGoyAAgoKTJwgXk07tBbJWf+wQwAvUN9L1Yph+uOvvUzqFt8LNEGw9jVPsZl QHcSEW/Ef/HK/OLwVZiPqse6lRJAdRZl5//vm4408jnXfJCy6KnvxcsO4Z1yTyoP kCXdWlSLBiidcRRWBfoQBSC3gANcx9a56ItWieEvJrdNOiyhb+gqEk7XraOlb/gf k4w2RKNm0Fv+kdNoFAnd =gpVc -----END PGP SIGNATURE-----

.

HP Systems Insight Manager v7.3 Hotfix kit HP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager v7.2 Hotfix kit is currently unavailable, but will be released at a later date.

http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

NOTE: No reboot of the system is required after applying the HP SIM Hotfix kit

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0142",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "linux enterprise workstation extension",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "storage",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "*",
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "42.1",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "linux enterprise software development kit",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "chrome for android",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.141",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v210.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "9.1-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "34.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "tivoli workload scheduler distributed ga level",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2.0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x7101",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.1",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.3",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.40",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "tivoli workload scheduler distributed fp05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "tivoli workload scheduler distributed fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "aura communication manager utility services sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.16.1.0.9.8",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.1",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "intelligencecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "9.3-beta1-p2",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "8.4-release-p12",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "netcool/system service monitor fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.014",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0",
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.2",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.2-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip edge clients for android",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.2",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0.1650.59",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.0.9.8",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7080",
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0.5",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.1.0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v19.7",
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "10.0-release-p5",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v310.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2",
         },
         {
            model: "infosphere balanced warehouse c4000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.1",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "infosphere balanced warehouse d5100",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "enterprise server x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "infosphere balanced warehouse c3000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "puredata system for operational analytics a1791",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "icewall sso certd r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v110.1",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli workload scheduler distributed fp07",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7080",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli workload scheduler distributed fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "9.1-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "88704.76.0",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0.6",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "cognos planning fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x7080",
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "blackberry link",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "1.2",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-iq device",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "stunnel",
            scope: "ne",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.02",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0.1025308",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.99",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.9",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "colorqube ps",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "85704.76.0",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise linux desktop client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.3",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "lotus foundations start",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "webex messenger service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.7",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "big-ip edge clients for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "ftp server",
            scope: "ne",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.3",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "57100",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge clients for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.6",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "project metasploit framework",
            scope: "ne",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.3",
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "project metasploit framework",
            scope: "eq",
            trust: 0.3,
            vendor: "metasploit",
            version: "4.9.2",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10500",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.1",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "8.4-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2.6",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77009.7",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7101",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "6.0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "icewall sso dfw certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.4",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4.0.15",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v39.7",
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.00",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.5.0.15",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.12",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.3",
         },
         {
            model: "enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "5",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "20500",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5600v29.7",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.01",
         },
         {
            model: "tivoli network manager ip edition fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.94",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.166",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-iq cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "big-iq security",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7101",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "project openssl 0.9.8za",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "35.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.1",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux desktop workstation client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "9.3-beta1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security analytics platform",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "7.1",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "67901",
         },
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "HP",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2014-0221",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-0221",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0221",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-0221",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8za,1.0.0m and 1.0.1h are vulnerable. These vulnerabilities include: \n\n* The SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"POODLE\", which could be exploited remotely\nresulting in disclosure of information. \n\n  - HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2010-5298\n      4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\n      4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)\n\n    CVE-2014-0076\n      4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n      1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2014-0195\n      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-0198\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0221\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0224\n      6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-3470\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-3566\n      3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\n      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2016-0705\n      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE recommends applying the following software updates to resolve the\nvulnerabilities in the impacted versions of HPE StoreVirtual products running\nHPE LeftHand OS. \n\nLeftHand OS v11.5 - Patches 45019-00 and 45020 \nLeftHand OS v12.0 - Patches 50016-00 and 50017-00 \nLeftHand OS v12.5 - Patch 55016-00 \nLeftHand OS v12.6 - Patch 56002-00 \n\n**Notes:**\n\nThese patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision\nto OpenSSL v1.0.1e 48. \nThese patches migrate Certificate Authority Hashing Algorithm from a weak\nhashing algorithm SHA1 to the stronger hashing algorithm SHA256. \n\nIn addition this update disables ZLIB compress by default. If you need\nto re-enable it for some reason, you can set the environment variable\nOPENSSL_NO_DEFAULT_ZLIB. \n\nThis update also fixes a header declaration which could result in\nbuild failures in applications using OpenSSL. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1.0.1e-2+deb7u11. OpenSSL\nis a 3rd party product that is embedded with some HP Software products. This\nbulletin notifies HP Software customers about products affected by the\nOpenSSL vulnerabilities\n\nNote: OpenSSL vulnerabilities, are vulnerabilities found in the OpenSSL\nproduct cryptographic software library product. This weakness potentially\nallows Man in the Middle (MITM) attack where the attacker can decrypt and\nmodify traffic from the attacked client and server. The impacted products\nappear in the list below are vulnerable due to embedding of OpenSSL standard\nrelease software. \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://www.openssl.org/news/secadv_20140605.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n ef1687f8f4d68dd34149dbb04f3fccda  mes5/i586/libopenssl0.9.8-0.9.8h-3.18mdvmes5.2.i586.rpm\n 3e46ee354bd0add0234eaf873f0a076c  mes5/i586/libopenssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.i586.rpm\n 0cc60393474d11a3786965d780e39ebc  mes5/i586/libopenssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.i586.rpm\n 16d367fe394b2f16b9f022ea7ba75a54  mes5/i586/openssl-0.9.8h-3.18mdvmes5.2.i586.rpm \n 223a4a6b80f1b2eb3cbfaf99473423f3  mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 85a51b41a45f6905ea778347d8b236c1  mes5/x86_64/lib64openssl0.9.8-0.9.8h-3.18mdvmes5.2.x86_64.rpm\n d0bf9ef6c6e33d0c6158add14cbe04b8  mes5/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm\n 707842b93162409157667f696996f4fc  mes5/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm\n 70f4de1608d99c970afa1786595a761d  mes5/x86_64/openssl-0.9.8h-3.18mdvmes5.2.x86_64.rpm \n 223a4a6b80f1b2eb3cbfaf99473423f3  mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nIt was discovered that the OBJ_obj2txt() function could fail to properly\nNUL-terminate its output. This could possibly cause an application using\nOpenSSL functions to format fields of X.509 certificates to disclose\nportions of its memory. (CVE-2014-0221,\nCVE-2014-3505, CVE-2014-3506)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed a\nhandshake when using the anonymous Diffie-Hellman (DH) key exchange. \n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.i386.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\n\nx86_64:\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl-0.9.8e-27.el5_10.4.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.i386.rpm\n\nia64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ia64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.ia64.rpm\n\nppc:\nopenssl-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ppc.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.ppc64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.ppc.rpm\n\ns390x:\nopenssl-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.s390.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.s390x.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.s390x.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.4.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities \n\nEMC Identifier: ESA-2014-079\n\nCVE Identifier:  See below for individual CVEs\n\nSeverity Rating: CVSS v2 Base Score:  See below for individual CVSS score for each CVE\n\nAffected products:  \n\\x95\tAll EMC Documentum Content Server versions of 7.1 prior to P07\n\\x95\tAll EMC Documentum Content Server versions of 7.0\n\\x95\tAll EMC Documentum Content Server versions of 6.7 SP2 prior to P16\n\\x95\tAll EMC Documentum Content Server versions of 6.7 SP1\n\\x95\tAll EMC Documentum Content Server versions prior to 6.7 SP1\n \nSummary:  \nEMC Documentum Content Server contains fixes for multiple vulnerabilities which also include vulnerabilities disclosed by the OpenSSL project on June 5, 2014 in OpenSSL. \n\nDetails: \nEMC Documentum Content Server may be susceptible to the following vulnerabilities:\n\n\\x95\tArbitrary Code Execution (CVE-2014-4618):\nAuthenticated non-privileged users can potentially execute Documentum methods with higher level privileges (up to and including superuser privileges) due to improper authorization checks being performed on user-created system objects. \nCVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)\n\n\\x95\tDQL Injection (CVE-2014-2520):\nCertain DQL hints in EMC Documentum Content Server may be potentially exploited by an authenticated non-privileged malicious user to conduct DQL injection attacks and read the database contents. This issue only affects Content Server running on Oracle database. \nCVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)\n\n\\x95\tInformation Disclosure (CVE-2014-2521):\nAuthenticated non-privileged users are allowed to retrieve meta-data of unauthorized system objects due to improper authorization checks being performed on certain RPC commands in Content Server. \nCVSS v2 Base Score: 6.3 (AV:N/AC:M/Au:S/C:C/I:N/A:N)\n\n\\x95\tMultiple OpenSSL vulnerabilities (See individual CVEs below and refer to NVD for each of their scores):\n\tSSL/TLS Man-in-the-middle (MITM) vulnerability (CVE-2014-0224)\n\tDTLS recursion flaw  (CVE-2014-0221)\n\tDTLS invalid fragment vulnerability (CVE-2014-0195)\n\tSSL_MODE_RELEASE_BUFFERS NULL pointer deference  (CVE-2014-0198)\n\tSSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)\n\tAnonymous ECDH denial of service (CVE-2014-3470)\n\tFLUSH + RELOAD cache side-channel attack (CVE-2014-0076)\nFor more information about these vulnerabilities, please visit the original OpenSSL advisory https://www.openssl.org/news/secadv_20140605.txt   \n\nResolution: \nThe following versions contain the resolution for these issues: \n\\x95\tEMC Documentum Content Server version 7.1 P07 and later\n\\x95\tEMC Documentum Content Server version 7.0: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \n\\x95\tEMC Documentum Content Server version 6.7 SP2 P16 and later\n\\x95\tEMC Documentum Content Server version 6.7 SP1: Hotfixes are available for Windows & Linux. Contact EMC Support to obtain them. For Solaris and AIX, contact EMC Support to open Hotfix requests. \n\nEMC recommends all customers to upgrade to one of the above versions at the earliest opportunity. \n\nLink to remedies:\nRegistered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/downloads/2732_Documentum-Server\n\nFor Hotfix, contact EMC Support. \n\n\n\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. \n\nFor an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\nEMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \nHP System Management Homepage versions 7.3.2 and earlier for Linux and\nWindows. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update\nAdvisory ID:       RHSA-2014:1021-01\nProduct:           Red Hat JBoss Enterprise Application Platform\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-1021.html\nIssue date:        2014-08-06\nCVE Names:         CVE-2014-0118 CVE-2014-0193 CVE-2014-0221 \n                   CVE-2014-0226 CVE-2014-0231 CVE-2014-3472 \n=====================================================================\n\n1. Summary:\n\nUpdated packages that provide Red Hat JBoss Enterprise Application Platform\n6.3.0 and fix multiple security issues, several bugs, and add various\nenhancements are now available from the Red Hat Customer Portal. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Description:\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7. \n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA denial of service flaw was found in the way httpd's mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. (CVE-2014-0221)\n\nNote: This update provides a fix for the CVE-2014-0221 issue in openssl\npackages for Solaris, HP-UX, and Microsoft Windows. \n\nA denial of service flaw was found in the way httpd's mod_cgid module\nexecuted CGI scripts that did not read data from the standard input. \nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nA flaw was found in the WebSocket08FrameDecoder implementation that could\nallow a remote attacker to trigger an Out Of Memory Exception by issuing a\nseries of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on\nthe server configuration, this could lead to a denial of service. \n(CVE-2014-0193)\n\nIt was found that the isCallerInRole() method of the SimpleSecurityManager\ndid not correctly check caller roles. A remote, authenticated attacker\ncould use this flaw to circumvent the caller check in applications that use\nblack list access control based on caller roles. (CVE-2014-3472)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-0221; upstream acknowledges Imre Rad of Search-Lab as the original\nreporter of this issue. Red Hat would also like to thank James Roper of\nTypesafe for reporting CVE-2014-0193, and CA Technologies for reporting\nCVE-2014-3472. \n\nThis release of JBoss Enterprise Application Platform also includes bug\nfixes and enhancements. Documentation for these changes will be available\nshortly from the JBoss Enterprise Application Platform 6.3.0 Release Notes,\nlinked to in the References. \n\nAll users of Red Hat JBoss Enterprise Application Platform 6.2 as provided\nfrom the Red Hat Customer Portal are advised to apply this update. \nThe JBoss server process must be restarted for the update to take effect. \n\n3. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss Enterprise Application Platform installation and\ndeployed applications. \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1092783 - CVE-2014-0193 netty: DoS via memory exhaustion during data aggregation\n1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake\n1103815 - CVE-2014-3472 JBoss AS Security: Invalid EJB caller role check implementation\n1120596 - CVE-2014-0231 httpd: mod_cgid denial of service\n1120601 - CVE-2014-0118 httpd: mod_deflate denial of service\n1120603 - CVE-2014-0226 httpd: mod_status heap-based buffer overflow\n\n5. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-0118.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0193.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0221.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0226.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0231.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3472.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=distributions&version=6.3\nhttps://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.3/html/6.3.0_Release_Notes/index.html\n\n6. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFT4mHwXlSAg2UNWIIRAthTAJ94pKdbkn56I+qIvIgz1YJ7QgsuiwCgoSHE\naywT1TARdEOozkGd3dp3miw=\n=izby\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04378799\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04378799\nVersion: 1\n\nHPSBMU03074 rev.1 - HP Insight Control server migration on Linux and Windows\nrunning OpenSSL, Remote Denial of Service (DoS), Code Execution, Unauthorized\nAccess, Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-07-23\nLast Updated: 2014-07-23\n\nPotential Security Impact: Remote denial of service (DoS), code execution,\nunauthorized access, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Insight\nControl server migration running on Linux and Windows which could be\nexploited remotely resulting in denial of service (DoS), code execution,\nunauthorized access, or disclosure of information. \n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service\nCVE-2014-0076 Unauthorized Disclosure of Information\nCVE-2014-0195 Remote Unauthorized Access\nCVE-2014-0198 Remote Denial of Service\nCVE-2014-0221 Remote Denial of Service (DoS)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nCVE-2014-3470 Remote Code Execution or Unauthorized Access\nSSRT101647\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control server migration v7.2.2, v7.3, v7.3.1, and v7.3.2\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to v7.3.2 of HP Insight Control server\nmigration to resolve these vulnerabilities by upgrading to version 7.3.3. \nPlease note that version 7.3.3 of HP Insight Control server migration is\nincluded on the HP Insight Management 7.3 Update 2 DVD. \n\nHP has provided the installation binaries for download from the following web\nsite by using the Receive for free option:\n\nhttp://h18013.www1.hp.com/products/servers/management/fpdownload.html\n\nCustomers using HP Insight Control server migration v7.2.2 must first upgrade\nfrom v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then\nupgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD. \n\nCustomers running HP Insight Control server migration v7.3, v7.3.1, or\nv7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to\ncomplete the upgrade. \n\nFor more information on the upgrade process, please refer to the HP Insight\nManagement Installation and Upgrade Guide and Release notes, which are\navailable at the following location:\n\nhttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind\nex.aspx?cat=insightmanagement\n\nNOTE: The upgrade paths described above update the entire HP Insight Control\nsoftware stack. To upgrade HP Insight Control server migration only, complete\nthe following steps:\n\nCopy \"hpsmp.exe\" to the local machine from the HP Insight Management v7.3.0\nUpdate 2 DVD ISO. Create batch file with the following commands:\n@echo off\nhpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch\nCopy the batch file to the folder where \"hpsmp.exe\" normally resides on the\ntarget system. \nDouble click on the batch file. \nThe HP Insight Control server migration installation starts in a command\nprompt. \nThe command prompt closes when the installation finishes. \nAfter the installation completes it creates a log file (ICmigr.log) and an\noutput file (ICmigroutput.xml) on the target system. \nDo not close or click on the command prompt while the process is completing. \nDo not run the command prompt in the background. \n\nHISTORY\nVersion:1 (rev.1) - 23 July 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\nHP IceWall SSO Dfw and MCRP\n\nIf possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to\nuse SSL/TLS for back-end web server connection. \n\nHP IceWall SSO Dfw Certd\n\nIf possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS\non any connection with LDAP server. \n\nNote: The HP IceWall product is only available in Japan. ============================================================================\nUbuntu Security Notice USN-2232-4\nAugust 18, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 10.04 LTS\n\nSummary:\n\nUSN-2232-1 introduced a regression in OpenSSL. One of the patch backports for\nUbuntu 10.04 LTS caused a regression for certain applications. This update\nfixes the problem. \n\nWe apologize for the inconvenience. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\n Ubuntu 14.04 LTS. This issue only\n affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. \n (CVE-2014-3470)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.21\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2014-09-17-3 OS X Mavericks 10.9.5 and Security Update\n2014-004\n\nOS X Mavericks 10.9.5 and Security Update 2014-004 are now available\nand address the following:\n\napache_mod_php\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in PHP 5.4.24\nDescription:  Multiple vulnerabilities existed in PHP 5.4.24, the\nmost serious of which may have led to arbitrary code execution. This\nupdate addresses the issues by updating PHP to version 5.4.30\nCVE-ID\nCVE-2013-7345\nCVE-2014-0185\nCVE-2014-0207\nCVE-2014-0237\nCVE-2014-0238\nCVE-2014-1943\nCVE-2014-2270\nCVE-2014-3478\nCVE-2014-3479\nCVE-2014-3480\nCVE-2014-3487\nCVE-2014-3515\nCVE-2014-3981\nCVE-2014-4049\n\nBluetooth\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of a\nBluetooth API call. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4390 : Ian Beer of Google Project Zero\n\nCoreGraphics\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or an information disclosure\nDescription:  An out of bounds memory read existed in the handling of\nPDF files. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nCoreGraphics\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  An integer overflow existed in the handling of PDF\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nFoundation\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  An application using NSXMLParser may be misused to disclose\ninformation\nDescription:  An XML External Entity issue existed in NSXMLParser's\nhandling of XML. This issue was addressed by not loading external\nentities across origins. \nCVE-ID\nCVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  Compiling untrusted GLSL shaders may lead to an unexpected\napplication termination or arbitrary code execution\nDescription:  A user-space buffer overflow existed in the shader\ncompiler. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4393 : Apple\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple validation issues existed in some integrated\ngraphics driver routines. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4394 : Ian Beer of Google Project Zero\nCVE-2014-4395 : Ian Beer of Google Project Zero\nCVE-2014-4396 : Ian Beer of Google Project Zero\nCVE-2014-4397 : Ian Beer of Google Project Zero\nCVE-2014-4398 : Ian Beer of Google Project Zero\nCVE-2014-4399 : Ian Beer of Google Project Zero\nCVE-2014-4400 : Ian Beer of Google Project Zero\nCVE-2014-4401 : Ian Beer of Google Project Zero\nCVE-2014-4416 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in the handling of\nIOKit API arguments. This issue was addressed through improved\nvalidation of IOKit API arguments. \nCVE-ID\nCVE-2014-4376 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOAcceleratorFamily function. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4402 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can read kernel pointers, which can be used to\nbypass kernel address space layout randomization\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOHIDFamily function. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-4379 : Ian Beer of Google Project Zero\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IODataQueue objects. This issue was addressed\nthrough improved validation of metadata. \nCVE-ID\nCVE-2014-4388 : @PanguTeam\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4389 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can infer kernel addresses and bypass kernel\naddress space layout randomization\nDescription:  In some cases, the CPU Global Descriptor Table was\nallocated at a predictable address. This issue was addressed through\nalways allocating the Global Descriptor Table at random addresses. \nCVE-ID\nCVE-2014-4403 : Ian Beer of Google Project Zero\n\nLibnotify\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with root privileges\nDescription:  An out-of-bounds write issue existed in Libnotify. This\nissue was addressed through improved bounds checking\nCVE-ID\nCVE-2014-4381 : Ian Beer of Google Project Zero\n\nOpenSSL\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in OpenSSL 0.9.8y, including one\nthat may lead to arbitrary code execution\nDescription:  Multiple vulnerabilities existed in OpenSSL 0.9.8y. \nThis update was addressed by updating OpenSSL to version 0.9.8za. \nCVE-ID\nCVE-2014-0076\nCVE-2014-0195\nCVE-2014-0221\nCVE-2014-0224\nCVE-2014-3470\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nRLE encoded movie files. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom\nGallagher & Paul Bates working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted MIDI file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the handling of MIDI\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nthe 'mvhd' atoms. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day\nInitiative\n\nruby\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A remote attacker may be able to cause arbitrary code\nexecution\nDescription:  A heap buffer overflow existed in LibYAML's handling of\npercent-encoded characters in a URI. This issue was addressed through\nimproved bounds checking. This update addresses the issues by\nupdating LibYAML to version 0.1.6\nCVE-ID\nCVE-2014-2525\n\n\nNote: OS X Mavericks 10.9.5 includes the security content of\nSafari 7.0.6: http://support.apple.com/kb/HT6367\n\nOS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nk4w2RKNm0Fv+kdNoFAnd\n=gpVc\n-----END PGP SIGNATURE-----\n\n. \n\nHP Systems Insight Manager v7.3 Hotfix kit\nHP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager\nv7.2 Hotfix kit is currently unavailable, but will be released at a later\ndate. \n\nhttp://h18013.www1.hp.com/products/servers/management/hpsim/download.html\n\nNOTE: No reboot of the system is required after applying the HP SIM Hotfix\nkit",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
         {
            db: "BID",
            id: "67901",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "127123",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0221",
            trust: 3,
         },
         {
            db: "BID",
            id: "67901",
            trust: 1.4,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59659",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59310",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59189",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59491",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59449",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59364",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59192",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59990",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59167",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58945",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59126",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61254",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59175",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59451",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59429",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59306",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59518",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60687",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59120",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59784",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58615",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59460",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59284",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59495",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59027",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58714",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59365",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59441",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59454",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59895",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59528",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1030337",
            trust: 1.1,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.4,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-0221",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128315",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127917",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127386",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127607",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127762",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127213",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127923",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127608",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140720",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127862",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127016",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127326",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127403",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127123",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127265",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126925",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            db: "BID",
            id: "67901",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "127123",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   id: "VAR-201406-0142",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4114296536842106,
   },
   last_update_date: "2024-11-27T19:44:15.121000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/07/10/fireeye_patches_os_torpedo_exploitdb_disclosure/",
         },
         {
            title: "Red Hat: CVE-2014-0221",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0221",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-4",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-3",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-2",
         },
         {
            title: "Debian Security Advisories: DSA-2950-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=909292f2afe623fbec51f7ab6b32f790",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2014-0221 ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/PotterXma/linux-deployment-standard ",
         },
         {
            title: "wormhole",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/wormhole ",
         },
         {
            title: "oval",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/oval ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 1.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 1.4,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.4,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.4,
            url: "http://www.fortiguard.com/advisory/fg-ir-14-018/",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821",
         },
         {
            trust: 1.4,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 1.4,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1021.html",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103593",
         },
         {
            trust: 1.1,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59491",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59659",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59120",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59528",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59126",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015300",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1.1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6060&myns=phmc&mync=e",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59495",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.1,
            url: "http://www.novell.com/support/kb/doc.php?id=7015264",
         },
         {
            trust: 1.1,
            url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=6061&myns=phmc&mync=e",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59895",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59451",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59990",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1053.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60687",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59784",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/kb/ht6443",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1.1,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1030337",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/67901",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:106",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:105",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676226",
         },
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61254",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59518",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59460",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59454",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59449",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59441",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59429",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59365",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59364",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59310",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59306",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59284",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59192",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59189",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59175",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59167",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59027",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58945",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58714",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58615",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=d3152655d5319ce883c8e3ac4b99f8de4c59d846",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.7,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0221_resource_management",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://www.cerberusftp.com/products/releasenotes.html",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2014/06/chrome-for-android-update.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678123",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678073",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www8.hp.com/us/en/software-solutions/operations-analytics-operations-analysis/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "https://community.rapid7.com/community/metasploit/blog/2014/06/05/security-advisory-openssl-vulnerabilities-cve-2014-0224-cve-2014-0221-in-metasploit",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685551",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15343.html",
         },
         {
            trust: 0.3,
            url: "http://www.marshut.com/ixwnpv/stunnel-5-02-released.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04363613",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368523",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678413",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676673",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678660",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/33a01-5228bdf5d027e/cert_security_mini-_bulletin_xrx15ao_for_cq8570-cq8870_v1-0.pdf",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182784",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676840",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676226",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682023",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682026",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682024",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www.ubuntu.com/usn/usn-2232-4/",
         },
         {
            trust: 0.2,
            url: "http://www.ubuntu.com/usn/usn-2232-1",
         },
         {
            trust: 0.2,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=34547",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2232-4/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4378",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4379",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0238",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1943",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4376",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-7345",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4377",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4350",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4381",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2525",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0237",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3480",
         },
         {
            trust: 0.1,
            url: "http://www.vsecurity.com/)",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2270",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0207",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3515",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht6367",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3479",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3478",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4049",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4374",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3981",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1356843",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.21",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-4",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall_patchaccess",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/fpdownload.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0118",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0226",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0226.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0193",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3472.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3472",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0193.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0118.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=distributions&version=6.3",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0231",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.3/html/6.3.0_release_notes/index.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0231.html",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-511c3e0b2f6f4f6bbc796fc619",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-bd9a1cf60e344c549c4888db93",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-3395d737d98f42149125b9bb05",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-3a7aa5e233904ebe847a5e1555",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-d775367b0a28449ca05660778b",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-e8076c2a35804685ad65b2b1ba",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4618",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2520",
         },
         {
            trust: 0.1,
            url: "https://support.emc.com/downloads/2732_documentum-server",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2521",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://www.hpe.com/info/report-security-vulnerability",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3505.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3506.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140806.txt",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3508.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3510.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1053.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/products/service_pack/hpsu",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/km01020441",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-8208c3987b1b4a5093f3e8fcc3",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-c0d32bac154a4d93839d8cd1f2",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-8aefeaf490284a7691eca97d13",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.18",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.14",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            db: "BID",
            id: "67901",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "127123",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            db: "BID",
            id: "67901",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "127123",
         },
         {
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-06-05T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "BID",
            id: "67901",
         },
         {
            date: "2014-09-19T15:26:13",
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            date: "2014-08-18T23:09:13",
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            date: "2014-07-09T04:03:23",
            db: "PACKETSTORM",
            id: "127386",
         },
         {
            date: "2014-07-24T23:47:46",
            db: "PACKETSTORM",
            id: "127607",
         },
         {
            date: "2014-08-07T06:23:24",
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            date: "2014-06-25T21:32:38",
            db: "PACKETSTORM",
            id: "127213",
         },
         {
            date: "2014-08-19T16:52:04",
            db: "PACKETSTORM",
            id: "127923",
         },
         {
            date: "2014-07-24T23:48:05",
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            date: "2017-01-25T21:54:44",
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            date: "2014-08-14T02:25:06",
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            date: "2014-06-10T17:33:47",
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            date: "2014-07-02T21:43:37",
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            date: "2014-07-09T17:11:19",
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            date: "2014-06-17T13:28:30",
            db: "PACKETSTORM",
            id: "127123",
         },
         {
            date: "2014-06-27T18:43:23",
            db: "PACKETSTORM",
            id: "127265",
         },
         {
            date: "2014-06-05T15:14:53",
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            date: "2014-06-05T21:55:06.207000",
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0221",
         },
         {
            date: "2017-05-23T16:25:00",
            db: "BID",
            id: "67901",
         },
         {
            date: "2024-11-21T02:01:40.337000",
            db: "NVD",
            id: "CVE-2014-0221",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127762",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "127016",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
      ],
      trust: 0.5,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL DTLS CVE-2014-0221 Remote Denial of Service Vulnerability",
      sources: [
         {
            db: "BID",
            id: "67901",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "67901",
         },
      ],
      trust: 0.3,
   },
}

var-201401-0254
Vulnerability from variot

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. OpenSSL is prone to multiple security-bypass vulnerabilities. Successfully exploiting these issues may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. OpenSSL versions 0.9.8y, and 1.0.0 through 1.0.1e are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04239372

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04239372 Version: 4

HPSBMU02998 rev.4 - HP System Management Homepage (SMH) running OpenSSL on Linux and Windows, Remote Disclosure of Information, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-04-13 Last Updated: 2014-05-13

Potential Security Impact: Remote disclosure of information, Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Also included is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information.

References:

CVE-2014-0160 (SSRT101501) Disclosure of Information - "Heartbleed" CVE-2013-4353 Denial of Service (DoS) CVE-2013-6449 Denial of Service (DoS) CVE-2013-6450 Denial of Service (DoS)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) v7.1.2, v7.2, v7.2.1, v7.2.2, v7.3, v7.3.1 for Linux and Windows.

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2013-4353 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2013-6449 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2013-6450 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made the following software updates available to resolve the vulnerabilities for the impacted versions of HP System Management Homepage (SMH):

Product version/Platform Download Location

SMH 7.2.3 Windows x86 http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52

SMH 7.2.3 Windows x64 http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37

SMH 7.3.2.1(B) Windows x86 http://www.hp.com/swpublishing/MTX-27e03b2f9cd24e77adc9dba94a

SMH 7.3.2.1(B) Windows x64 http://www.hp.com/swpublishing/MTX-37075daeead2433cb41b59ae76

SMH 7.3.2 Linux x86 http://www.hp.com/swpublishing/MTX-3d92ccccf85f404e8ba36a8178

SMH 7.3.2 Linux x64 http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37

Notes

SMH 7.2.3 recommended for customers running Windows 2003 OS Updated OpenSSL to version 1.0.1g

Note: If you believe your SMH installation was exploited while it was running components vulnerable to heartbleed, there are some steps to perform after youve upgraded to the non-vulnerable components. These steps include revoking, recreating, and re-importing certificates and resetting passwords that might have been harvested by a malicious attacker using the heartbleed vulnerability.

Impact on VCA - VCRM communication: VCA configures VCRM by importing the SMH certificate from the SMH of VCA into the SMH of VCRM. When this certificate is deleted & regenerated (as suggested before), it needs to be (re)imported if the user wants to continue with Trust by Certificate option, and the outdated certificate should be revoked (deleted) from each location where it was previously imported. If you use HPSIMs 2-way trust feature, and have imported SMH certificates into HPSIM, you will also need to revoke those SMH certificated from HPSIM and reimport the newly created SMH certificates. Though SMH uses OS credentials using OS-based APIs, user provided credentials are passed from the client (browser) to the server (SMH) using the HTTPS protocol. If you suspect your systems using SMH were exploited while they were vulnerable to heartbleed, these passwords need to be reset.

Frequently Asked Questions

Will updated systems require a reboot after applying the SMH patch? No, reboot of the system will not be required. Installing the new build is sufficient to get back to the normal state. Is a Firmware Update necessary in addition to the SMH patch? No, only the SMH update is sufficient to remove the heartbleed-vulnerable version of SMH. Will new certificates be issued along with the patch, or need to be handled separately? If you suspect the certificate has been compromised due to this vulnerability, we do recommend to delete and revoke the certificate, or SMH will reuse the existing certificate. New certificate will be created when SMH service starts (at the end of the fresh / upgrade installation). Instructions on deleting the certificate are in the notes above. Where can I get SMH documentation? All major documents are available at: http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library Select HP Insight Management under Product and Solutions & check HP System Management Homepage to get SMH related documents.

What are the recommended upgrade paths? See the table below: SMH DVD SPP Recommended SMH update for Linux Recommended SMH update for Windows 2003 and Widows 2003 R2 Recommended SMH update for other Windows OS versions

v7.1.2 v7.1.2 2012.10.0 v7.3.2 v7.2.3 v7.3.2

v7.2.0 v7.2.0 2013.02.0(B) v7.3.2 v7.2.3 v7.3.2

v7.2.1 v7.2u1

v7.3.2 v7.2.3 v7.3.2

v7.2.2 v7.2u2 2013.09.0(B) v7.3.2 v7.2.3 v7.3.2

v7.3.0 v7.3.0

v7.3.2 not supported v7.3.2

v7.3.1 v7.3.1 2014.02.0 v7.3.2 not supported v7.3.2

How can I verify whether my setup is patched successfully? SMH version can be verified by executing following command on: Windows: hp\hpsmh\bin\smhlogreader version Linux: /opt/hp/hpsmh/bin/smhlogreader version Will VCA-VCRM communication be impacted due to the SMH certificate being deleted? VCA configures VCRM by importing the SMH certificate (sslshare\cert.pem) from the SMH of VCA to the SMH of VCRM. When this certificate is deleted & regenerated (as suggested before), it needs to be (re)imported if user wants to continue with Trust by Certificate option, and remove the old, previously imported certificate. Should I reset password on all managed nodes, where SMH was/is running? Though SMH uses OS credentials using OS based APIs, user-provided credentials are passed from the client (browser) to the server (SMH) using the HTTPS protocol. Passwords need to be reset if you suspect the vulnerable version of SMH was exploited by malicious users/ hackers.

HISTORY Version:1 (rev.1) - 13 April 2014 Initial release Version:2 (rev.2) - 17 April 2014 SMH 7.2.3 and 7.3.2 released Version:3 (rev.3) - 30 April 2014 SMH 7.3.2.1(B) released Version:4 (rev.4) - 13 May 2014 Added additional remediation steps for post update installation

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-14:03.openssl Security Advisory The FreeBSD Project

Topic: OpenSSL multiple vulnerabilities

Category: contrib Module: openssl Announced: 2014-01-14 Affects: FreeBSD 10.0 prior to 10.0-RC5 Corrected: 2014-01-07 20:04:41 UTC (stable/10, 10.0-PRERELEASE) 2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC5) 2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC4-p1) 2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC3-p1) 2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC2-p1) 2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC1-p1) CVE Name: CVE-2013-4353, CVE-2013-6449, CVE-2013-6450

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2013-6449]

III.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

fetch http://security.FreeBSD.org/patches/SA-14:03/openssl.patch

fetch http://security.FreeBSD.org/patches/SA-14:03/openssl.patch.asc

gpg --verify openssl.patch.asc

b) Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/10/ r260404 releng/10.0/ r260405


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-39


                                        http://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 26, 2014 Bugs: #494816, #519264, #525468 ID: 201412-39


Synopsis

Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in Denial of Service or Man-in-the-Middle attacks.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1j *>= 0.9.8z_p2 >= 1.0.1j

Description

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1j"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p2"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

References

[ 1 ] CVE-2013-6449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449 [ 2 ] CVE-2013-6450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450 [ 3 ] CVE-2014-3505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505 [ 4 ] CVE-2014-3506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506 [ 5 ] CVE-2014-3507 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507 [ 6 ] CVE-2014-3509 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509 [ 7 ] CVE-2014-3510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510 [ 8 ] CVE-2014-3511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511 [ 9 ] CVE-2014-3512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512 [ 10 ] CVE-2014-3513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513 [ 11 ] CVE-2014-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567 [ 12 ] CVE-2014-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568 [ 13 ] CVE-2014-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201412-39.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 .

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1f-i486-1_slack14.1.txz: Upgraded. This update fixes the following security issues: Fix for TLS record tampering bug CVE-2013-4353 Fix for TLS version checking bug CVE-2013-6449 Fix for DTLS retransmission bug CVE-2013-6450 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450 ( Security fix ) patches/packages/openssl-solibs-1.0.1f-i486-1_slack14.1.txz: Upgraded. +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1f-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1f-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1f-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1f-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1f-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1f-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1f-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1f-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1f-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1f-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: f059432e11a6b17643e7b8f1d78c5ce3 openssl-0.9.8y-i486-1_slack13.0.txz 46c623b2e58053d308b3d9eb735be26b openssl-solibs-0.9.8y-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 4fb6f07f85ec4ea26cc67d8b1c037fa9 openssl-0.9.8y-x86_64-1_slack13.0.txz 55bafd74f182806b1dcd076f31683743 openssl-solibs-0.9.8y-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 9713a64881622c63d0756ec9a5914980 openssl-0.9.8y-i486-1_slack13.1.txz 5d8e3984389bd080bc37b9d1276c7a7d openssl-solibs-0.9.8y-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: 821c76387f3ffa388af9e5bf81185758 openssl-0.9.8y-x86_64-1_slack13.1.txz b6d525a53b4cda641166f19ee70a9650 openssl-solibs-0.9.8y-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 5195be05b85f5eb2bd4bf9ebf0a73ff9 openssl-0.9.8y-i486-1_slack13.37.txz 5248a839148fa91de52361335dc051f5 openssl-solibs-0.9.8y-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 15e13676d0def5f0dac1e7a4704e0016 openssl-0.9.8y-x86_64-1_slack13.37.txz d4e5bd308d2e918c6bd7616343370c49 openssl-solibs-0.9.8y-x86_64-1_slack13.37.txz

Slackware 14.0 packages: 1bb0907950c9f573899db21db15eb2b7 openssl-1.0.1f-i486-1_slack14.0.txz 677d7a6f86c4ae1ba507de9e9efba2f0 openssl-solibs-1.0.1f-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: e006bdbf032de2a5b6b6a3304e96473f openssl-1.0.1f-x86_64-1_slack14.0.txz 56958f463cc6e78451c9096a266d9085 openssl-solibs-1.0.1f-x86_64-1_slack14.0.txz

Slackware 14.1 packages: e0c4e52c930fb32aa4ddf23079ac1e42 openssl-1.0.1f-i486-1_slack14.1.txz 3e51d8f2c1a9b763f037aa8dd51ad548 openssl-solibs-1.0.1f-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: 2f18bac7c335eab1251decd15d8fce4c openssl-1.0.1f-x86_64-1_slack14.1.txz a61b7c01a06974b55a692c7359d16183 openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz

Slackware -current packages: c07a84c4dc4dd27cc0c452fb650f2b5b a/openssl-solibs-1.0.1f-i486-1.txz 454153984c2d8bb76ff631416cc3550a n/openssl-1.0.1f-i486-1.txz

Slackware x86_64 -current packages: 9bef5de5f7d04d5c4fdd5ad62801472e a/openssl-solibs-1.0.1f-x86_64-1.txz 6523e9d4befa8e1531ffd5a9377c897b n/openssl-1.0.1f-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1f-i486-1_slack14.1.txz openssl-solibs-1.0.1f-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2014:0015-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0015.html Issue date: 2014-01-08 CVE Names: CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 =====================================================================

  1. Summary:

Updated openssl packages that fix three security issues are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

A flaw was found in the way OpenSSL determined which hashing algorithm to use when TLS protocol version 1.2 was enabled. This could possibly cause OpenSSL to use an incorrect hashing algorithm, leading to a crash of an application using the library. A lost or discarded renegotiation handshake packet could cause a DTLS client or server using OpenSSL to crash. (CVE-2013-6450)

A NULL pointer dereference flaw was found in the way OpenSSL handled TLS/SSL protocol handshake packets. A specially crafted handshake packet could cause a TLS/SSL client using OpenSSL to crash. (CVE-2013-4353)

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1045363 - CVE-2013-6449 openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm 1047840 - CVE-2013-6450 openssl: crash in DTLS renegotiation after packet loss 1049058 - CVE-2013-4353 openssl: client NULL dereference crash on malformed handshake packets

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm openssl-perl-1.0.1e-16.el6_5.4.i686.rpm openssl-static-1.0.1e-16.el6_5.4.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.4.ppc.rpm openssl-1.0.1e-16.el6_5.4.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.4.ppc.rpm openssl-devel-1.0.1e-16.el6_5.4.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.4.s390.rpm openssl-1.0.1e-16.el6_5.4.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.s390x.rpm openssl-devel-1.0.1e-16.el6_5.4.s390.rpm openssl-devel-1.0.1e-16.el6_5.4.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-perl-1.0.1e-16.el6_5.4.i686.rpm openssl-static-1.0.1e-16.el6_5.4.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.4.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.4.ppc64.rpm openssl-static-1.0.1e-16.el6_5.4.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.4.s390x.rpm openssl-perl-1.0.1e-16.el6_5.4.s390x.rpm openssl-static-1.0.1e-16.el6_5.4.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.4.i686.rpm openssl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.4.i686.rpm openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm openssl-perl-1.0.1e-16.el6_5.4.i686.rpm openssl-static-1.0.1e-16.el6_5.4.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2013-4353.html https://www.redhat.com/security/data/cve/CVE-2013-6449.html https://www.redhat.com/security/data/cve/CVE-2013-6450.html https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFSzZgHXlSAg2UNWIIRAofWAJ0UK4cssiN2fV0WOt0Ui+wDi/A1BwCfUSDk njgv4mXCZgK/Bf84S2BcZl8= =j7J/ -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0254",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.10",
         },
         {
            model: "cms r16 r5",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "virtual i/o server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "virtual i/o server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21-21",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "enterprise linux hpc node optional",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.4",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "flex system common agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "tivoli storage productivity center fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.14",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2143",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "puppet",
            scope: "ne",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "3.1.2",
         },
         {
            model: "cms r16.3 r7",
            scope: "ne",
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "enterprise linux server optional",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.18",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "56009.7",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.18",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.11",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "systems director common agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "systems director common agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "infosphere balanced warehouse c3000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1.185",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "flex system platform agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.1",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "3.0.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "3.1.1",
         },
         {
            model: "virtual i/o server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "560010.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.18",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.17",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.11",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "3.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.4",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77009.7",
         },
         {
            model: "enterprise linux workstation optional",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.12",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.33",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.4",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.8.3",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.11",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.1.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "cms r17 r4",
            scope: "ne",
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "cms r16",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "integrated lights out manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.2.3",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.15",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.170",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "sheep fencing llc pfsense",
            scope: "eq",
            trust: 0.3,
            vendor: "electric",
            version: "2.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.10",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.5",
         },
         {
            model: "infosphere balanced warehouse c4000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.21",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.23",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21-20",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "76009.7",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "smart analytics system for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10509.7",
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "enterprise linux desktop optional",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.177",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.21",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "netcool/system service monitor fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.014",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.23",
         },
         {
            model: "sheep fencing llc pfsense",
            scope: "ne",
            trust: 0.3,
            vendor: "electric",
            version: "2.1.1",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.4",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.17",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.4",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "systems director platform agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7",
         },
         {
            model: "tivoli netcool system service monitors",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "12.2",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.178",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.13",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.145",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "57109.7",
         },
         {
            model: "tivoli storage productivity center fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.10",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.7.22",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.13",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.2.143",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.16",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.20",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.13",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.3",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "cms r17 r3",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.4",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "infosphere balanced warehouse d5100",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.19",
         },
         {
            model: "systems director platform agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.4",
         },
         {
            model: "puppet",
            scope: "eq",
            trust: 0.3,
            vendor: "puppetlabs",
            version: "2.6.14",
         },
         {
            model: "tivoli storage productivity center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.3",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "cms r16 r6",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.5",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "12.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "virtual i/o server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "system management homepage 7.3.2.1",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.04",
         },
         {
            model: "smart analytics system for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "20509.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "arx",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.13",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "64618",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported these issues.",
      sources: [
         {
            db: "BID",
            id: "64618",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-6450",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2013-6450",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-6450",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201401-001",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. OpenSSL is prone to multiple security-bypass vulnerabilities. \nSuccessfully exploiting these issues may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. \nOpenSSL versions 0.9.8y, and 1.0.0 through 1.0.1e are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04239372\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04239372\nVersion: 4\n\nHPSBMU02998 rev.4 - HP System Management Homepage (SMH) running OpenSSL on\nLinux and Windows, Remote Disclosure of Information, Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-04-13\nLast Updated: 2014-05-13\n\nPotential Security Impact: Remote disclosure of information, Denial of\nService (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH) running on Linux and Windows. The vulnerabilities\ncould be exploited remotely resulting in Denial of Service (DoS). Also\nincluded is the OpenSSL vulnerability known as \"Heartbleed\" which could be\nexploited remotely resulting in disclosure of information. \n\nReferences:\n\nCVE-2014-0160 (SSRT101501) Disclosure of Information - \"Heartbleed\"\nCVE-2013-4353 Denial of Service (DoS)\nCVE-2013-6449 Denial of Service (DoS)\nCVE-2013-6450 Denial of Service (DoS)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) v7.1.2, v7.2, v7.2.1, v7.2.2, v7.3,\nv7.3.1 for Linux and Windows. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2013-4353    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2013-6449    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2013-6450    (AV:N/AC:M/Au:N/C:N/I:P/A:P)       5.8\nCVE-2014-0160    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following software updates available to resolve the\nvulnerabilities for the impacted versions of HP System Management Homepage\n(SMH):\n\nProduct version/Platform\n Download Location\n\nSMH 7.2.3 Windows x86\n http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52\n\nSMH 7.2.3 Windows x64\n http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37\n\nSMH 7.3.2.1(B) Windows x86\n http://www.hp.com/swpublishing/MTX-27e03b2f9cd24e77adc9dba94a\n\nSMH 7.3.2.1(B) Windows x64\n http://www.hp.com/swpublishing/MTX-37075daeead2433cb41b59ae76\n\nSMH 7.3.2 Linux x86\n http://www.hp.com/swpublishing/MTX-3d92ccccf85f404e8ba36a8178\n\nSMH 7.3.2 Linux x64\n http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37\n\nNotes\n\nSMH 7.2.3 recommended for customers running Windows 2003 OS\nUpdated OpenSSL to version 1.0.1g\n\nNote: If you believe your SMH installation was exploited while it was running\ncomponents vulnerable to heartbleed, there are some steps to perform after\nyouve upgraded to the non-vulnerable components. These steps include\nrevoking, recreating, and re-importing certificates and resetting passwords\nthat might have been harvested by a malicious attacker using the heartbleed\nvulnerability. \n\nImpact on VCA - VCRM communication: VCA configures VCRM by importing the SMH\ncertificate from the SMH of VCA into the SMH of VCRM. When this certificate\nis deleted & regenerated (as suggested before), it needs to be (re)imported\nif the user wants to continue with Trust by Certificate option, and the\noutdated certificate should be revoked (deleted) from each location where it\nwas previously imported. \nIf you use HPSIMs 2-way trust feature, and have imported SMH certificates\ninto HPSIM, you will also need to revoke those SMH certificated from HPSIM\nand reimport the newly created SMH certificates. \nThough SMH uses OS credentials using OS-based APIs, user provided credentials\nare passed from the client (browser) to the server (SMH) using the HTTPS\nprotocol. If you suspect your systems using SMH were exploited while they\nwere vulnerable to heartbleed, these passwords need to be reset. \n\nFrequently Asked Questions\n\nWill updated systems require a reboot after applying the SMH patch?\nNo, reboot of the system will not be required. Installing the new build is\nsufficient to get back to the normal state. \nIs a Firmware Update necessary in addition to the SMH patch?\nNo, only the SMH update is sufficient to remove the heartbleed-vulnerable\nversion of SMH. \nWill new certificates be issued along with the patch, or need to be handled\nseparately?\nIf you suspect the certificate has been compromised due to this\nvulnerability, we do recommend to delete and revoke the certificate, or SMH\nwill reuse the existing certificate. New certificate will be created when SMH\nservice starts (at the end of the fresh / upgrade installation). Instructions\non deleting the certificate are in the notes above. \nWhere can I get SMH documentation?\nAll major documents are available at:\nhttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library\nSelect HP Insight Management under Product and Solutions & check HP System\nManagement Homepage to get SMH related documents. \n\nWhat are the recommended upgrade paths?\nSee the table below:\nSMH\n DVD\n SPP\n Recommended SMH update for Linux\n Recommended SMH update for Windows 2003 and Widows 2003 R2\n Recommended SMH update for other Windows OS versions\n\nv7.1.2\n v7.1.2\n 2012.10.0\n v7.3.2\n v7.2.3\n v7.3.2\n\nv7.2.0\n v7.2.0\n 2013.02.0(B)\n v7.3.2\n v7.2.3\n v7.3.2\n\nv7.2.1\n v7.2u1\n\n v7.3.2\n v7.2.3\n v7.3.2\n\nv7.2.2\n v7.2u2\n 2013.09.0(B)\n v7.3.2\n v7.2.3\n v7.3.2\n\nv7.3.0\n v7.3.0\n\n v7.3.2\n not supported\n v7.3.2\n\nv7.3.1\n v7.3.1\n 2014.02.0\n v7.3.2\n not supported\n v7.3.2\n\nHow can I verify whether my setup is patched successfully?\nSMH version can be verified by executing following command on:\nWindows: hp\\hpsmh\\bin\\smhlogreader version\nLinux: /opt/hp/hpsmh/bin/smhlogreader version\nWill VCA-VCRM communication be impacted due to the SMH certificate being\ndeleted?\nVCA configures VCRM by importing the SMH certificate (sslshare\\cert.pem) from\nthe SMH of VCA to the SMH of VCRM. When this certificate is deleted &\nregenerated (as suggested before), it needs to be (re)imported if user wants\nto continue with Trust by Certificate option, and remove the old, previously\nimported certificate. \nShould I reset password on all managed nodes, where SMH was/is running?\nThough SMH uses OS credentials using OS based APIs, user-provided credentials\nare passed from the client (browser) to the server (SMH) using the HTTPS\nprotocol. Passwords need to be reset if you suspect the vulnerable version of\nSMH was exploited by malicious users/ hackers. \n\nHISTORY\nVersion:1 (rev.1) - 13 April 2014 Initial release\nVersion:2 (rev.2) - 17 April 2014 SMH 7.2.3 and 7.3.2 released\nVersion:3 (rev.3) - 30 April 2014 SMH 7.3.2.1(B) released\nVersion:4 (rev.4) - 13 May 2014 Added additional remediation steps for post\nupdate installation\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-14:03.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          OpenSSL multiple vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2014-01-14\nAffects:        FreeBSD 10.0 prior to 10.0-RC5\nCorrected:      2014-01-07 20:04:41 UTC (stable/10, 10.0-PRERELEASE)\n                2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC5)\n                2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC4-p1)\n                2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC3-p1)\n                2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC2-p1)\n                2014-01-07 20:06:20 UTC (releng/10.0, 10.0-RC1-p1)\nCVE Name:       CVE-2013-4353, CVE-2013-6449, CVE-2013-6450\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2013-6449]\n\nIII. \n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n# fetch http://security.FreeBSD.org/patches/SA-14:03/openssl.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:03/openssl.patch.asc\n# gpg --verify openssl.patch.asc\n\nb) Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nRecompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/10/                                                        r260404\nreleng/10.0/                                                      r260405\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201412-39\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: December 26, 2014\n     Bugs: #494816, #519264, #525468\n       ID: 201412-39\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, the worst of which\ncould result in Denial of Service or Man-in-the-Middle attacks. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1j              *>= 0.9.8z_p2\n                                                            >= 1.0.1j\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review\nthe CVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1j\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p2\"\n\nPackages which depend on this library may need to be recompiled. Tools\nsuch as revdep-rebuild may assist in identifying these packages. \n\nReferences\n==========\n\n[  1 ] CVE-2013-6449\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449\n[  2 ] CVE-2013-6450\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450\n[  3 ] CVE-2014-3505\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505\n[  4 ] CVE-2014-3506\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506\n[  5 ] CVE-2014-3507\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507\n[  6 ] CVE-2014-3509\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509\n[  7 ] CVE-2014-3510\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510\n[  8 ] CVE-2014-3511\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511\n[  9 ] CVE-2014-3512\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512\n[ 10 ] CVE-2014-3513\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513\n[ 11 ] CVE-2014-3567\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567\n[ 12 ] CVE-2014-3568\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568\n[ 13 ] CVE-2014-5139\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-39.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1f-i486-1_slack14.1.txz:  Upgraded. \n  This update fixes the following security issues:\n    Fix for TLS record tampering bug CVE-2013-4353\n    Fix for TLS version checking bug CVE-2013-6449\n    Fix for DTLS retransmission bug CVE-2013-6450\n  For more information, see:\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450\n  (* Security fix *)\npatches/packages/openssl-solibs-1.0.1f-i486-1_slack14.1.txz:  Upgraded. \n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1f-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1f-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1f-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1f-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1f-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1f-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1f-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1f-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1f-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1f-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\nf059432e11a6b17643e7b8f1d78c5ce3  openssl-0.9.8y-i486-1_slack13.0.txz\n46c623b2e58053d308b3d9eb735be26b  openssl-solibs-0.9.8y-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n4fb6f07f85ec4ea26cc67d8b1c037fa9  openssl-0.9.8y-x86_64-1_slack13.0.txz\n55bafd74f182806b1dcd076f31683743  openssl-solibs-0.9.8y-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n9713a64881622c63d0756ec9a5914980  openssl-0.9.8y-i486-1_slack13.1.txz\n5d8e3984389bd080bc37b9d1276c7a7d  openssl-solibs-0.9.8y-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n821c76387f3ffa388af9e5bf81185758  openssl-0.9.8y-x86_64-1_slack13.1.txz\nb6d525a53b4cda641166f19ee70a9650  openssl-solibs-0.9.8y-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n5195be05b85f5eb2bd4bf9ebf0a73ff9  openssl-0.9.8y-i486-1_slack13.37.txz\n5248a839148fa91de52361335dc051f5  openssl-solibs-0.9.8y-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n15e13676d0def5f0dac1e7a4704e0016  openssl-0.9.8y-x86_64-1_slack13.37.txz\nd4e5bd308d2e918c6bd7616343370c49  openssl-solibs-0.9.8y-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\n1bb0907950c9f573899db21db15eb2b7  openssl-1.0.1f-i486-1_slack14.0.txz\n677d7a6f86c4ae1ba507de9e9efba2f0  openssl-solibs-1.0.1f-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\ne006bdbf032de2a5b6b6a3304e96473f  openssl-1.0.1f-x86_64-1_slack14.0.txz\n56958f463cc6e78451c9096a266d9085  openssl-solibs-1.0.1f-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\ne0c4e52c930fb32aa4ddf23079ac1e42  openssl-1.0.1f-i486-1_slack14.1.txz\n3e51d8f2c1a9b763f037aa8dd51ad548  openssl-solibs-1.0.1f-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\n2f18bac7c335eab1251decd15d8fce4c  openssl-1.0.1f-x86_64-1_slack14.1.txz\na61b7c01a06974b55a692c7359d16183  openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\nc07a84c4dc4dd27cc0c452fb650f2b5b  a/openssl-solibs-1.0.1f-i486-1.txz\n454153984c2d8bb76ff631416cc3550a  n/openssl-1.0.1f-i486-1.txz\n\nSlackware x86_64 -current packages:\n9bef5de5f7d04d5c4fdd5ad62801472e  a/openssl-solibs-1.0.1f-x86_64-1.txz\n6523e9d4befa8e1531ffd5a9377c897b  n/openssl-1.0.1f-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1f-i486-1_slack14.1.txz openssl-solibs-1.0.1f-i486-1_slack14.1.txz \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2014:0015-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0015.html\nIssue date:        2014-01-08\nCVE Names:         CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nA flaw was found in the way OpenSSL determined which hashing algorithm to\nuse when TLS protocol version 1.2 was enabled. This could possibly cause\nOpenSSL to use an incorrect hashing algorithm, leading to a crash of an\napplication using the library. A lost or discarded renegotiation\nhandshake packet could cause a DTLS client or server using OpenSSL to\ncrash. (CVE-2013-6450)\n\nA NULL pointer dereference flaw was found in the way OpenSSL handled\nTLS/SSL protocol handshake packets. A specially crafted handshake packet\ncould cause a TLS/SSL client using OpenSSL to crash. (CVE-2013-4353)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1045363 - CVE-2013-6449 openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm\n1047840 - CVE-2013-6450 openssl: crash in DTLS renegotiation after packet loss\n1049058 - CVE-2013-4353 openssl: client NULL dereference crash on malformed handshake packets\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.4.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.4.ppc.rpm\nopenssl-1.0.1e-16.el6_5.4.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.4.s390.rpm\nopenssl-1.0.1e-16.el6_5.4.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.4.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.4.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.4.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.4.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.4.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-4353.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-6449.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-6450.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFSzZgHXlSAg2UNWIIRAofWAJ0UK4cssiN2fV0WOt0Ui+wDi/A1BwCfUSDk\nnjgv4mXCZgK/Bf84S2BcZl8=\n=j7J/\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
         {
            db: "BID",
            id: "64618",
         },
         {
            db: "PACKETSTORM",
            id: "126457",
         },
         {
            db: "PACKETSTORM",
            id: "126605",
         },
         {
            db: "PACKETSTORM",
            id: "126209",
         },
         {
            db: "PACKETSTORM",
            id: "124794",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "124782",
         },
         {
            db: "PACKETSTORM",
            id: "124716",
         },
      ],
      trust: 1.8,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-6450",
            trust: 2.6,
         },
         {
            db: "BID",
            id: "64618",
            trust: 1.3,
         },
         {
            db: "SECTRACK",
            id: "1029549",
            trust: 1,
         },
         {
            db: "SECTRACK",
            id: "1031594",
            trust: 1,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "126457",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126605",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126209",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "124794",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "129721",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "124782",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "124716",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "64618",
         },
         {
            db: "PACKETSTORM",
            id: "126457",
         },
         {
            db: "PACKETSTORM",
            id: "126605",
         },
         {
            db: "PACKETSTORM",
            id: "126209",
         },
         {
            db: "PACKETSTORM",
            id: "124794",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "124782",
         },
         {
            db: "PACKETSTORM",
            id: "124716",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   id: "VAR-201401-0254",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.452724815,
   },
   last_update_date: "2024-11-29T22:07:17.374000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "openssl-1.0.1f",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47334",
         },
      ],
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2014-0015.html",
         },
         {
            trust: 1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1,
            url: "http://www.securitytracker.com/id/1029549",
         },
         {
            trust: 1,
            url: "http://www.openssl.org/news/vulnerabilities.html",
         },
         {
            trust: 1,
            url: "http://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b",
         },
         {
            trust: 1,
            url: "http://www.ubuntu.com/usn/usn-2079-1",
         },
         {
            trust: 1,
            url: "https://puppet.com/security/cve/cve-2013-6450",
         },
         {
            trust: 1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html",
         },
         {
            trust: 1,
            url: "http://www.debian.org/security/2014/dsa-2833",
         },
         {
            trust: 1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html",
         },
         {
            trust: 1,
            url: "http://www.securityfocus.com/bid/64618",
         },
         {
            trust: 1,
            url: "https://security-tracker.debian.org/tracker/cve-2013-6450",
         },
         {
            trust: 1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1,
            url: "http://www.securitytracker.com/id/1031594",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-6450",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-6449",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-4353",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www.hp.com/swpublishing/mtx-d1488fd987894bc4ab3fe0ef52",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.3,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.3,
            url: "http://www.hp.com/swpublishing/mtx-3d92ccccf85f404e8ba36a8178",
         },
         {
            trust: 0.3,
            url: "http://www.hp.com/swpublishing/mtx-4575754bbb614b58bf0ae1ac37",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.3,
            url: "http://www.hp.com/swpublishing/mtx-bfd3c0fb11184796b9428ced37",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-37075daeead2433cb41b59ae76",
         },
         {
            trust: 0.2,
            url: "http://www.hp.com/swpublishing/mtx-27e03b2f9cd24e77adc9dba94a",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-41199f68c1144acb84a5798bf0",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-2e19c856f0e84e20a14c63ecd0",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:03/openssl.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6449>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4353>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6450>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:03.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:03/openssl.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6450",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6449",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5139",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3507",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3507",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6450",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4353",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6449",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2013-6450.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2013-6449.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2013-4353.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "64618",
         },
         {
            db: "PACKETSTORM",
            id: "126457",
         },
         {
            db: "PACKETSTORM",
            id: "126605",
         },
         {
            db: "PACKETSTORM",
            id: "126209",
         },
         {
            db: "PACKETSTORM",
            id: "124794",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "124782",
         },
         {
            db: "PACKETSTORM",
            id: "124716",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "BID",
            id: "64618",
         },
         {
            db: "PACKETSTORM",
            id: "126457",
         },
         {
            db: "PACKETSTORM",
            id: "126605",
         },
         {
            db: "PACKETSTORM",
            id: "126209",
         },
         {
            db: "PACKETSTORM",
            id: "124794",
         },
         {
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            db: "PACKETSTORM",
            id: "124782",
         },
         {
            db: "PACKETSTORM",
            id: "124716",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-20T00:00:00",
            db: "BID",
            id: "64618",
         },
         {
            date: "2014-05-03T02:16:52",
            db: "PACKETSTORM",
            id: "126457",
         },
         {
            date: "2014-05-13T18:24:00",
            db: "PACKETSTORM",
            id: "126605",
         },
         {
            date: "2014-04-17T22:05:06",
            db: "PACKETSTORM",
            id: "126209",
         },
         {
            date: "2014-01-15T18:02:22",
            db: "PACKETSTORM",
            id: "124794",
         },
         {
            date: "2014-12-26T15:46:37",
            db: "PACKETSTORM",
            id: "129721",
         },
         {
            date: "2014-01-14T22:22:00",
            db: "PACKETSTORM",
            id: "124782",
         },
         {
            date: "2014-01-09T01:36:19",
            db: "PACKETSTORM",
            id: "124716",
         },
         {
            date: "2014-01-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            date: "2014-01-01T16:05:15.017000",
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-05-12T19:46:00",
            db: "BID",
            id: "64618",
         },
         {
            date: "2022-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
         {
            date: "2024-11-21T01:59:15.400000",
            db: "NVD",
            id: "CVE-2013-6450",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL Security hole",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201401-001",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0122
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2.4 and Sterling File Gateway allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. This vulnerability CVE-2013-2983 Is a different vulnerability.By any third party Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0122",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "sterling file gateway",
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60878",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "60878",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0455",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2013-0455",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-60457",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0455",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0455",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-026",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60457",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2.4 and Sterling File Gateway allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. This vulnerability CVE-2013-2983 Is a different vulnerability.By any third party Web Script or HTML May be inserted. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "BID",
            id: "60878",
         },
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0455",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "60878",
            trust: 1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
            trust: 0.7,
         },
         {
            db: "AIXAPAR",
            id: "IC92888",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-60457",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            db: "BID",
            id: "60878",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   id: "VAR-201307-0122",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T15:30:19.353000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC92888",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC92888",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46363",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic92888",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0455",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0455",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/60878",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            db: "BID",
            id: "60878",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            db: "BID",
            id: "60878",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-02T00:00:00",
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "BID",
            id: "60878",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            date: "2013-07-02T14:12:45.423000",
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-10-10T00:00:00",
            db: "VULHUB",
            id: "VHN-60457",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "BID",
            id: "60878",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
         {
            date: "2013-10-10T18:33:41.443000",
            db: "NVD",
            id: "CVE-2013-0455",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003182",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-026",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0126
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename. Attackers can exploit this issue to bypass certain intended security restrictions and perform unauthorized actions on the affected system. This may aid in further attacks. The vulnerability stems from the fact that the program does not restrict the use of file types and extensions

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0126",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "60997",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0479",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0479",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8,
                  id: "VHN-60481",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0479",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0479",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-053",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60481",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not properly restrict file types and extensions, which allows remote authenticated users to bypass intended access restrictions via a crafted filename. \nAttackers can exploit this issue to  bypass certain intended security restrictions and perform unauthorized  actions on the affected system. This may aid in further attacks. The vulnerability stems from the fact that the program does not restrict the use of file types and extensions",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "BID",
            id: "60997",
         },
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0479",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "81547",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60997",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-60481",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            db: "BID",
            id: "60997",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   id: "VAR-201307-0126",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T13:03:31.416000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-264",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81547",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0479",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0479",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81547",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            db: "BID",
            id: "60997",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            db: "BID",
            id: "60997",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            date: "2013-07-05T00:00:00",
            db: "BID",
            id: "60997",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            date: "2013-07-03T13:54:30.990000",
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60481",
         },
         {
            date: "2013-07-05T00:00:00",
            db: "BID",
            id: "60997",
         },
         {
            date: "2013-10-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
         {
            date: "2017-08-29T01:33:03.150000",
            db: "NVD",
            id: "CVE-2013-0479",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to access restrictions",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003198",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "permissions and access control",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-053",
         },
      ],
      trust: 0.6,
   },
}

var-201506-0210
Vulnerability from variot

The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. The following are vulnerable: OpenSSL 1.0.2 prior to 1.0.2b OpenSSL 1.0.1 prior to 1.0.1n OpenSSL 1.0.0 prior to 1.0.0s OpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015] =======================================

DHE man-in-the-middle protection (Logjam)

A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).

OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n

Fixes for this issue were developed by Emilia Käsper and Kurt Roeckx of the OpenSSL development team.

Malformed ECParameters causes infinite loop (CVE-2015-1788)

Severity: Moderate

When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field.

This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.

This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.

Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

Severity: Moderate

X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.

An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.

PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)

Severity: Moderate

The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.

Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.

CMS verify infinite loop with unknown hash function (CVE-2015-1792)

Severity: Moderate

When verifying a signedData message the CMS code can enter an infinite loop if presented with an unknown hash function OID.

This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Race condition handling NewSessionTicket (CVE-2015-1791)

Severity: Low

If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was discovered by Emilia Käsper of the OpenSSL development team. The fix was developed by Matt Caswell of the OpenSSL development team.

Invalid free in DTLS (CVE-2014-8176)

Severity: Moderate

This vulnerability does not affect current versions of OpenSSL. It existed in previous OpenSSL versions and was fixed in June 2014.

If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.

This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.

The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04760669

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04760669 Version: 1

HPSBUX03388 SSRT102180 rev.1 - HP-UX running OpenSSL, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2015-08-05 Last Updated: 2015-08-05

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled.

References:

CVE-2015-4000: DHE man-in-the-middle protection (Logjam).

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided an updated version of OpenSSL to resolve this vulnerability.

A new B.11.31 depot for OpenSSL_A.01.00.01p is available here:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I

MANUAL ACTIONS: Yes - Update

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.01.00.01p or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 5 August 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-02


                                       https://security.gentoo.org/

Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: June 22, 2015 Bugs: #551832 ID: 201506-02


Synopsis

Multiple vulnerabilities have been found in OpenSSL that can result in either Denial of Service or information disclosure.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o

Description

Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7"

References

[ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201506-02

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. ============================================================================ Ubuntu Security Notice USN-2639-1 June 11, 2015

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. (CVE-2014-8176)

Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. (CVE-2015-1788)

Robert Swiecki and Hanno B=C3=B6ck discovered that OpenSSL incorrectly handled certain ASN1_TIME strings. (CVE-2015-1791)

Johannes Bauer discovered that OpenSSL incorrectly handled verifying signedData messages using the CMS code. (CVE-2015-1792)

As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04: libssl1.0.0 1.0.1f-1ubuntu11.4

Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.8

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.15

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.31

After a standard system update you need to reboot your computer to make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-2639-1 CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792

Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4 https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8 https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-15:10.openssl Security Advisory The FreeBSD Project

Topic: Multiple OpenSSL vulnerabilities

Category: contrib Module: openssl Announced: 2015-06-12 Affects: All supported versions of FreeBSD. Corrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE) 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12) 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE) 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16) 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE) 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30) CVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 CVE-2015-1792, CVE-2015-4000

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

II. [CVE-2015-1791]

The OpenSSL advisory also describes a problem that is identified as CVE-2014-8176, which is already fixed by an earlier FreeBSD Errata Notice, FreeBSD-EN-15:02.openssl.

III. [CVE-2015-4000]. [CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem was no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]

An attacker may be able to crash multi-thread applications that supports resumed TLS handshakes. [CVE-2015-1791]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.1]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc

gpg --verify openssl-10.1.patch.asc

[FreeBSD 9.3 and 8.4]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r284286 releng/8.4/ r284295 stable/9/ r284286 releng/9.3/ r284295 stable/10/ r284285 releng/10.1/ r284295


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.4 (FreeBSD)

iQIcBAEBCgAGBQJVeopGAAoJEO1n7NZdz2rnzhQP/Ak6el188Y+7QbEYVfCZ7eG8 BQLj5TMGHV5swSKVlPcEuBlMwTjpgB5Gqhc8luDS0eIAuJGdcMPSrZDdXxWQFtPf pbfIwp/ElFc7d6ut0Y8t6fFLJbhTOoHJpzTGkFRfJkjinGOx7OZQPeLJsxSubbnL JKugZ3diH6yk6IPMf9SvhO/kYXUF1VbXQvHNTnqgdhFVkgF6tK22Pkl2XoJ9EHbh vBXft1yJwiYlZ//DxZuScTUj1pHYzK3bOpg//REJMWCMj1RVwQr2EyDa0Q2cT02d eRnSZykXD69eybyzEck+BvwnUYYJICimnHuE5t78UIr0D/NWyOAZTQ99z5TID5aV HXkcil+1E/Q+xBB4+5UOOnESf6cmiWwewQOVvD26ZY39E6oJXvsrWnyxIuCG6DL9 sLtxB6iTYlTX5Civ/VJX8H7rFiw4UwMembthvGzck22026iHjplWM3GCWz0E8O3R PrXBHjAzNFawK3owNMxFSUFTuFw/qY7EEwJ3SKCEC+hoxcLOl26NMxrQKRIAUk+I MMOaZfvOh2uM19y9SJZz8+sqU8gIm7ihDm5fuSkO8kY0jdvLwyS9bXAejN/lZ6oJ TyfTDDyXDOdaPpnpQehh6vQV0NiaJ+WXfGhfiE8/G/t6b1E0LlCaaGJTpYkildGe vVCM4Nyx4S9WDFOi76ug =dyhg -----END PGP SIGNATURE----- .

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz: Upgraded. +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 383ecfed6bfef1440a44d7082745848a openssl-0.9.8zg-i486-1_slack13.0.txz fb186187ffa200e22d9450a9d0e321f6 openssl-solibs-0.9.8zg-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: eb52318ed52fef726402f0b2a74745c5 openssl-0.9.8zg-x86_64-1_slack13.0.txz 9447927b960a01b21149e28a9783021f openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 37f46f6b4fe2acbe217eaf7c0b33b704 openssl-0.9.8zg-i486-1_slack13.1.txz 986de2e71676f61d788a59a1e0c8de1f openssl-solibs-0.9.8zg-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: 6b160ce817dcde3ae5b3a861b284387b openssl-0.9.8zg-x86_64-1_slack13.1.txz 503d891680c711162386ea7e3daadca8 openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 5e7501b1d73d01d3d87704c3cfd3a888 openssl-0.9.8zg-i486-1_slack13.37.txz 874f0b59870dd3f259640c9930a02f99 openssl-solibs-0.9.8zg-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: b6d91614458040d461dff3c3eab45206 openssl-0.9.8zg-x86_64-1_slack13.37.txz be106df5e59c2be7fa442df8ba85ad0b openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz

Slackware 14.0 packages: ee7c3937e6a6d7ac7537f751af7da7b9 openssl-1.0.1n-i486-1_slack14.0.txz 758662437d33f99ec0a686cedeb1919e openssl-solibs-1.0.1n-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 2dfdc4729e93cf460018e9e30a6223dc openssl-1.0.1n-x86_64-1_slack14.0.txz 9cb4b34e97e60f6bfe4c843aabeae954 openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 5a9bf08d55615cfc097109c2e3786f7b openssl-1.0.1n-i486-1_slack14.1.txz fb1c05468e5c38d51a8ff6ac435e3a20 openssl-solibs-1.0.1n-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: 1ef5cede3f954c3e4741012ffa76b750 openssl-1.0.1n-x86_64-1_slack14.1.txz ea22c288c60ae1d7ea8c5b3a1608462b openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz

Slackware -current packages: 56db8712d653c060f910e8915a8f8656 a/openssl-solibs-1.0.1n-i586-1.txz 6d6264c9943e27240db5c8f5ec342e27 n/openssl-1.0.1n-i586-1.txz

Slackware x86_64 -current packages: e73f7aff5aa0ad14bc06428544f99ae2 a/openssl-solibs-1.0.1n-x86_64-1.txz 91b550b9eb0ac0c580e158375a93c0e4 n/openssl-1.0.1n-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0210",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0r",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zf",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3.0.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.4",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0.0",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "hp-ux b.11.22",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "buildforge ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.28",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "15.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.5",
         },
         {
            model: "junos 12.1x47-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 14.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "open source siem",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "junos 13.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.2",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "ascenlink",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "7.2.3",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "hp-ux b.11.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.9",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "workflow for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "junos 13.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "imc products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "enterprise linux server eus 6.6.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos 14.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "communications security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.3",
         },
         {
            model: "qradar incident forensics mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.2",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.10.38",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.00",
         },
         {
            model: "filenet system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.0.3",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3x48-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.33",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "enterprise content management system monitor fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.02",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.6",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 15.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.03",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "junos 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.1",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "rational policy tester",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.1",
         },
         {
            model: "junos 14.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.0",
         },
         {
            model: "enterprise content management system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.3",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "project openssl 1.0.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "junos 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "aura conferencing sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "security network controller 1.0.3387m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos 12.1x44-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 15.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "50",
         },
         {
            model: "exalogic infrastructure eecs",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.213",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.14",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "hp-ux b.11.11.16.09",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "mysql enterprise backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.12.3",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.4",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry fixpack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.413",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.34",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0.14",
         },
         {
            model: "cognos insight standard edition fp if",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.214",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.16",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "icewall federation agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "hp-ux b.11.11.13.14",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "junos 14.1r6",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.16",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system networking rackswitch g8124-e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "70",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0.1",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.3",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "hp-ux b.11.23.1.007",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.0",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "forticlient windows/mac",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.3",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "15.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security identity governance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "ds8870 r7.5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.2.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.12.4",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.12",
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.18",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux x86 64 -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.0.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "fortivoice enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.6",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "hp-ux b.11.11.02.008",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.11",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.16",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.0",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x46-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.1",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.21.0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.5.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "project openssl 0.9.8zg",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "junos 13.2x51-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "powerkvm build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.157",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "buildforge ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3.66",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.1",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1",
         },
         {
            model: "project openssl 1.0.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "vcx products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "rational software architect for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "qradar incident forensics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "junos 12.1x47-d45",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "qradar siem mr1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.12.0",
         },
         {
            model: "junos 12.1x44-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "hp-ux b.11.11.17.02",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.01",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "fortiddos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.1.5",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "hp-ux b.11.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "secure backup",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.3",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "forticlient ios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "forticlient android",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.6",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "sonas",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "hp-ux b.11.23.07.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "qradar incident forensics mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "aura conferencing sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system networking rackswitch g8316",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.15.0",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11.15",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.02",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 12.1x46-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "junos 12.3r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "linux enterprise server sp1 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.5",
         },
         {
            model: "junos 13.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "cognos insight standard edition fp",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.24",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "project openssl 1.0.0r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 15.1x49-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "forticache",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "junos 14.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "buildforge ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.37",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "workload deployer if9",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.7",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.10",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.13",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.2",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.6",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.43",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "cognos insight standard edition fp if",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.124",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.0",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "fsso build",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "235",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "hp-ux b.11.11.14.15",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3x48-d30",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system networking rackswitch g8332",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.20.0",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.6",
         },
         {
            model: "fortiadc",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.5",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.3",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "mysql enterprise backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12.01",
         },
         {
            model: "unified security management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.15",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "buildforge",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.8",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "hp-ux b.11.11.15.13",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.05",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "qradar incident forensics patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.12",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "junos 15.1x49-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 14.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.3",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "icewall sso certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security identity manager virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.214",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "15.04",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.19",
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "75154",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Johannes Bauer",
      sources: [
         {
            db: "BID",
            id: "75154",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-1792",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2015-1792",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-1792",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201506-248",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-1792",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. \nThe following are vulnerable:\nOpenSSL 1.0.2 prior to 1.0.2b\nOpenSSL 1.0.1 prior to 1.0.1n\nOpenSSL 1.0.0 prior to 1.0.0s\nOpenSSL 0.9.8 prior to 0.9.8zg. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\n\nFixes for this issue were developed by Emilia Käsper and Kurt Roeckx\nof the OpenSSL development team. \n\nMalformed ECParameters causes infinite loop (CVE-2015-1788)\n===========================================================\n\nSeverity: Moderate\n\nWhen processing an ECParameters structure OpenSSL enters an infinite loop if\nthe curve specified is over a specially malformed binary polynomial field. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates.  This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno Böck. The fix\nwas developed by Emilia Käsper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by  Michal\nZalewski (Google). The fix was developed by Emilia Käsper of the\nOpenSSL development team. \n\nCMS verify infinite loop with unknown hash function (CVE-2015-1792)\n===================================================================\n\nSeverity: Moderate\n\nWhen verifying a signedData message the CMS code can enter an infinite loop\nif presented with an unknown hash function OID. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nRace condition handling NewSessionTicket (CVE-2015-1791)\n========================================================\n\nSeverity: Low\n\nIf a NewSessionTicket is received by a multi-threaded client when attempting to\nreuse a previous ticket then a race condition can occur potentially leading to\na double free of the ticket data. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was discovered by Emilia Käsper of the OpenSSL development team. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nInvalid free in DTLS (CVE-2014-8176)\n====================================\n\nSeverity: Moderate\n\nThis vulnerability does not affect current versions of OpenSSL. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04760669\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04760669\nVersion: 1\n\nHPSBUX03388 SSRT102180 rev.1 - HP-UX running OpenSSL, Remote Disclosure of\nInformation\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-08-05\nLast Updated: 2015-08-05\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running\nOpenSSL with SSL/TLS enabled. \n\nReferences:\n\nCVE-2015-4000: DHE man-in-the-middle protection (Logjam). \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-4000    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2015-1788    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1789    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1790    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1791    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2015-1792    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1793    (AV:N/AC:L/Au:N/C:P/I:P/A:N)       6.4\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided an updated version of OpenSSL to resolve this vulnerability. \n\nA new B.11.31 depot for OpenSSL_A.01.00.01p is available here:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.01.00.01p or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 5 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201506-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: June 22, 2015\n     Bugs: #551832\n       ID: 201506-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL that can result in\neither Denial of Service or information disclosure. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1o               >= 0.9.8z_p7\n                                                            >= 1.0.1o\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1o\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-8176\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176\n[ 2 ] CVE-2015-1788\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788\n[ 3 ] CVE-2015-1789\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789\n[ 4 ] CVE-2015-1790\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790\n[ 5 ] CVE-2015-1791\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791\n[ 6 ] CVE-2015-1792\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792\n[ 7 ] CVE-2015-4000\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201506-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. ============================================================================\nUbuntu Security Notice USN-2639-1\nJune 11, 2015\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \n\nSoftware Description:\n- openssl: Secure Socket Layer (SSL) cryptographic library and tools\n\nDetails:\n\nPraveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that\nOpenSSL incorrectly handled memory when buffering DTLS data. (CVE-2014-8176)\n\nJoseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed\nECParameters structures. (CVE-2015-1788)\n\nRobert Swiecki and Hanno B=C3=B6ck discovered that OpenSSL incorrectly handled\ncertain ASN1_TIME strings. \n(CVE-2015-1791)\n\nJohannes Bauer discovered that OpenSSL incorrectly handled verifying\nsignedData messages using the CMS code. \n(CVE-2015-1792)\n\nAs a security improvement, this update also modifies OpenSSL behaviour to\nreject DH key sizes below 768 bits, preventing a possible downgrade\nattack. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n  libssl1.0.0                     1.0.1f-1ubuntu11.4\n\nUbuntu 14.10:\n  libssl1.0.0                     1.0.1f-1ubuntu9.8\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.15\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.31\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-2639-1\n  CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790,\n  CVE-2015-1791, CVE-2015-1792\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15\n  https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-15:10.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          Multiple OpenSSL vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2015-06-12\nAffects:        All supported versions of FreeBSD. \nCorrected:      2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE)\n                2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12)\n                2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE)\n                2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16)\n                2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE)\n                2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30)\nCVE Name:       CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791\n                CVE-2015-1792, CVE-2015-4000\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:https://security.FreeBSD.org/>. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nII. [CVE-2015-1791]\n\nThe OpenSSL advisory also describes a problem that is identified as\nCVE-2014-8176, which is already fixed by an earlier FreeBSD Errata\nNotice, FreeBSD-EN-15:02.openssl. \n\nIII. [CVE-2015-4000]. \n[CVE-2015-1788].  This affects FreeBSD 10.1 only, as the problem\nwas no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]\n\nAn attacker may be able to crash multi-thread applications that\nsupports resumed TLS handshakes. [CVE-2015-1791]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc\n# gpg --verify openssl-10.1.patch.asc\n\n[FreeBSD 9.3 and 8.4]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r284286\nreleng/8.4/                                                       r284295\nstable/9/                                                         r284286\nreleng/9.3/                                                       r284295\nstable/10/                                                        r284285\nreleng/10.1/                                                      r284295\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:https://www.openssl.org/news/secadv_20150611.txt>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788> \n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>\n\nThe latest revision of this advisory is available at\n<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:10.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.4 (FreeBSD)\n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\nvVCM4Nyx4S9WDFOi76ug\n=dyhg\n-----END PGP SIGNATURE-----\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1n-i486-1_slack14.1.txz:  Upgraded. \n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zg-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zg-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zg-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zg-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1n-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1n-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1n-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1n-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1n-i586-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1n-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1n-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n383ecfed6bfef1440a44d7082745848a  openssl-0.9.8zg-i486-1_slack13.0.txz\nfb186187ffa200e22d9450a9d0e321f6  openssl-solibs-0.9.8zg-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\neb52318ed52fef726402f0b2a74745c5  openssl-0.9.8zg-x86_64-1_slack13.0.txz\n9447927b960a01b21149e28a9783021f  openssl-solibs-0.9.8zg-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n37f46f6b4fe2acbe217eaf7c0b33b704  openssl-0.9.8zg-i486-1_slack13.1.txz\n986de2e71676f61d788a59a1e0c8de1f  openssl-solibs-0.9.8zg-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n6b160ce817dcde3ae5b3a861b284387b  openssl-0.9.8zg-x86_64-1_slack13.1.txz\n503d891680c711162386ea7e3daadca8  openssl-solibs-0.9.8zg-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n5e7501b1d73d01d3d87704c3cfd3a888  openssl-0.9.8zg-i486-1_slack13.37.txz\n874f0b59870dd3f259640c9930a02f99  openssl-solibs-0.9.8zg-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\nb6d91614458040d461dff3c3eab45206  openssl-0.9.8zg-x86_64-1_slack13.37.txz\nbe106df5e59c2be7fa442df8ba85ad0b  openssl-solibs-0.9.8zg-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nee7c3937e6a6d7ac7537f751af7da7b9  openssl-1.0.1n-i486-1_slack14.0.txz\n758662437d33f99ec0a686cedeb1919e  openssl-solibs-1.0.1n-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n2dfdc4729e93cf460018e9e30a6223dc  openssl-1.0.1n-x86_64-1_slack14.0.txz\n9cb4b34e97e60f6bfe4c843aabeae954  openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n5a9bf08d55615cfc097109c2e3786f7b  openssl-1.0.1n-i486-1_slack14.1.txz\nfb1c05468e5c38d51a8ff6ac435e3a20  openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\n1ef5cede3f954c3e4741012ffa76b750  openssl-1.0.1n-x86_64-1_slack14.1.txz\nea22c288c60ae1d7ea8c5b3a1608462b  openssl-solibs-1.0.1n-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n56db8712d653c060f910e8915a8f8656  a/openssl-solibs-1.0.1n-i586-1.txz\n6d6264c9943e27240db5c8f5ec342e27  n/openssl-1.0.1n-i586-1.txz\n\nSlackware x86_64 -current packages:\ne73f7aff5aa0ad14bc06428544f99ae2  a/openssl-solibs-1.0.1n-x86_64-1.txz\n91b550b9eb0ac0c580e158375a93c0e4  n/openssl-1.0.1n-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1n-i486-1_slack14.1.txz openssl-solibs-1.0.1n-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. The\nvulnerabilities could be exploited remotely resulting in Denial of Service\n(DoS)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
         {
            db: "BID",
            id: "75154",
         },
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-1792",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "75154",
            trust: 2,
         },
         {
            db: "JUNIPER",
            id: "JSA10694",
            trust: 2,
         },
         {
            db: "MCAFEE",
            id: "SB10122",
            trust: 1.7,
         },
         {
            db: "BID",
            id: "91787",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1032564",
            trust: 1.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-1792",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169629",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132973",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132260",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132288",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132285",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "136989",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "BID",
            id: "75154",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   id: "VAR-201506-0210",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.27443620166666666,
   },
   last_update_date: "2024-11-28T20:36:44.952000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "openssl-1.0.1n",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56612",
         },
         {
            title: "openssl-1.0.0s",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56611",
         },
         {
            title: "openssl-0.9.8zg",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56610",
         },
         {
            title: "openssl-1.0.2b",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=56613",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/",
         },
         {
            title: "Red Hat: CVE-2015-1792",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1792",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2639-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-550",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-550",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20150611' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-07",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150612-openssl",
         },
         {
            title: "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2015-1792 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.1,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            trust: 2,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10694",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 2,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1115.html",
         },
         {
            trust: 2,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl",
         },
         {
            trust: 2,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.8,
            url: "http://www.securityfocus.com/bid/75154",
         },
         {
            trust: 1.8,
            url: "https://security.gentoo.org/glsa/201506-02",
         },
         {
            trust: 1.8,
            url: "http://www.ubuntu.com/usn/usn-2639-1",
         },
         {
            trust: 1.7,
            url: "https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c",
         },
         {
            trust: 1.7,
            url: "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 1.7,
            url: "https://support.apple.com/kb/ht205031",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/91787",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.7,
            url: "https://openssl.org/news/secadv/20150611.txt",
         },
         {
            trust: 1.7,
            url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "https://bto.bluecoat.com/security-advisory/sa98",
         },
         {
            trust: 1.7,
            url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05353965",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.7,
            url: "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc",
         },
         {
            trust: 1.7,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10122",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160647.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160436.html",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1032564",
         },
         {
            trust: 1.7,
            url: "http://www.debian.org/security/2015/dsa-3287",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.7,
            url: "https://access.redhat.com/security/cve/cve-2015-1792",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/errata/rhsa-2015:1115",
         },
         {
            trust: 0.6,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228607",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965845",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/13",
         },
         {
            trust: 0.3,
            url: "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04739301",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05353965",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/135",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1022724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005313",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21961837",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962520",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963232",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963954",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965415",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21966484",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098801",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012435",
         },
         {
            trust: 0.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-15-014/",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/5438/security-advisory-alienvault-v5-0-4-addresses-31-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962726",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963964",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005375",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022647",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961800",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964033",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963532",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960157",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961179",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962493",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962623",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=0&uid=swg21963438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959518",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961569",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963270",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964113",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005314",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966481",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966847",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966873",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21967384",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968046",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968871",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970020",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970667",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963603",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966381",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.2,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.2,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/399.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2639-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=43094",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3286",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.1,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1793",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20150611.txt>",
         },
         {
            trust: 0.1,
            url: "https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4000>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-15:10.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "https://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/swpublishing/mtx-b59b11be53744759a650eadeb4",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/sim",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "BID",
            id: "75154",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            db: "BID",
            id: "75154",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-06-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            date: "2015-06-11T00:00:00",
            db: "BID",
            id: "75154",
         },
         {
            date: "2015-06-11T12:12:12",
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            date: "2015-08-06T10:10:00",
            db: "PACKETSTORM",
            id: "132973",
         },
         {
            date: "2015-06-22T14:14:00",
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            date: "2015-06-11T23:39:03",
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            date: "2015-06-12T13:25:28",
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            date: "2015-06-12T13:17:58",
            db: "PACKETSTORM",
            id: "132285",
         },
         {
            date: "2016-05-13T16:14:13",
            db: "PACKETSTORM",
            id: "136989",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2015-06-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            date: "2015-06-12T19:59:05.273000",
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-02-13T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1792",
         },
         {
            date: "2017-05-02T04:06:00",
            db: "BID",
            id: "75154",
         },
         {
            date: "2023-04-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
         {
            date: "2024-11-21T02:26:09.137000",
            db: "NVD",
            id: "CVE-2015-1792",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "132260",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL Resource Management Error Vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201506-248",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0073
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling File Gateway 2.2 and Sterling B2B Integrator allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2013-0468. This vulnerability CVE-2013-0455 Is a different vulnerability.By any third party Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. These vulnerabilities stem from the program's failure to validate user-submitted input

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0073",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60880",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "60880",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-2983",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2013-2983",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-62985",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-2983",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-2983",
                  trust: 0.8,
                  value: "Low",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-027",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-62985",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling File Gateway 2.2 and Sterling B2B Integrator allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2013-0468. This vulnerability CVE-2013-0455 Is a different vulnerability.By any third party Web Script or HTML May be inserted. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. These vulnerabilities stem from the program's failure to validate user-submitted input",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "BID",
            id: "60880",
         },
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-2983",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "60880",
            trust: 1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
            trust: 0.7,
         },
         {
            db: "AIXAPAR",
            id: "IC91045",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-62985",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            db: "BID",
            id: "60880",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   id: "VAR-201307-0073",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T15:40:05.756000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "IC91045",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC91045",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic91045",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2983",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2983",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/60880",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            db: "BID",
            id: "60880",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            db: "BID",
            id: "60880",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-02T00:00:00",
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "BID",
            id: "60880",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            date: "2013-07-02T14:12:50.777000",
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-10-07T00:00:00",
            db: "VULHUB",
            id: "VHN-62985",
         },
         {
            date: "2013-06-29T00:00:00",
            db: "BID",
            id: "60880",
         },
         {
            date: "2013-10-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
         {
            date: "2013-10-07T17:49:39.053000",
            db: "NVD",
            id: "CVE-2013-2983",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling File Gateway and  Sterling B2B Integrator Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003183",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-027",
         },
      ],
      trust: 0.6,
   },
}

var-201405-0244
Vulnerability from variot

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. HP Systems Insight Manager v7.2, v7.2.1, v7.2.2, v7.3, v7.3.0a, and v7.3.1 are bundled with the following software products:

HP Smart Update Manager (SUM) 5.3.5 through 6.3.1 HP System Management Homepage (SMH) v7.2.3 and 7.3.2 for Linux and Windows HP Version Control Agent (VCA) v7.3.2 for Windows HP Version Control Agent (VCA) v7.3.2 for Linux HP Version Control Repository Manager (VCRM) v7.2.0, v7.2.1, v7.2.2, v7.3.0, and v7.3.1 for Windows

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following software updates to resolve these vulnerabilities in HP Systems Insight Manager (SIM).

HP Systems Insight Manager v7.3 Hotfix kit HP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager v7.2 Hotfix kit is currently unavailable, but will be released at a later date.

http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

NOTE: No reboot of the system is required after applying the HP SIM Hotfix kit.

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message (CVE-2014-3513).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue became relevant after the CVE-2014-3568 fix (CVE-2014-3569).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c (CVE-2014-8275).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS kz0ex6eI6hA6qSwklA2NoXY= =GYjX -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201407-05


                                        http://security.gentoo.org/

Severity: High Title: OpenSSL: Multiple vulnerabilities Date: July 27, 2014 Bugs: #512506 ID: 201407-05


Synopsis

Multiple vulnerabilities have been found in OpenSSL, possibly allowing remote attackers to execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All OpenSSL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1h-r1"

References

[ 1 ] CVE-2010-5298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298 [ 2 ] CVE-2014-0195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195 [ 3 ] CVE-2014-0198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198 [ 4 ] CVE-2014-0221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221 [ 5 ] CVE-2014-0224 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224 [ 6 ] CVE-2014-3470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470 [ 7 ] OpenSSL Security Advisory [05 Jun 2014] http://www.openssl.org/news/secadv_20140605.txt

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201407-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2014:0625-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0625.html Issue date: 2014-06-05 CVE Names: CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)

Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433

A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. A remote attacker could possibly use this flaw to execute arbitrary code on a DTLS client or server. (CVE-2014-0195)

Multiple flaws were found in the way OpenSSL handled read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or server using OpenSSL could crash or unexpectedly drop connections when processing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221)

A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)

Red Hat would like to thank the OpenSSL project for reporting these issues. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195, Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix Gröbert and Ivan Fratrić of Google as the original reporters of CVE-2014-3470.

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free 1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() 1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability 1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake 1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment 1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.14.ppc.rpm openssl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.14.s390.rpm openssl-1.0.1e-16.el6_5.14.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-devel-1.0.1e-16.el6_5.14.s390.rpm openssl-devel-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-static-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-perl-1.0.1e-16.el6_5.14.s390x.rpm openssl-static-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2010-5298.html https://www.redhat.com/security/data/cve/CVE-2014-0195.html https://www.redhat.com/security/data/cve/CVE-2014-0198.html https://www.redhat.com/security/data/cve/CVE-2014-0221.html https://www.redhat.com/security/data/cve/CVE-2014-0224.html https://www.redhat.com/security/data/cve/CVE-2014-3470.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/articles/904433 https://access.redhat.com/site/solutions/905793

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB pJJhdOUzRUL8R2haDM4xrsk= =hZF8 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. These vulnerabilities include:

  • The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information.

  • HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5

  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2010-5298
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)

CVE-2014-0076
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2014-0195
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-0198
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0221
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0224
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-3470
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-3566
  3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the following software updates to resolve the vulnerabilities in the impacted versions of HPE StoreVirtual products running HPE LeftHand OS.

LeftHand OS v11.5 - Patches 45019-00 and 45020 LeftHand OS v12.0 - Patches 50016-00 and 50017-00 LeftHand OS v12.5 - Patch 55016-00 LeftHand OS v12.6 - Patch 56002-00

Notes:

These patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision to OpenSSL v1.0.1e 48. These patches migrate Certificate Authority Hashing Algorithm from a weak hashing algorithm SHA1 to the stronger hashing algorithm SHA256.

HISTORY

Version:1 (rev.1) - 7 October 2016 Initial release

Version:2 (rev.2) - 13 October 2016 Updated the Resolution section

Version:3 (rev.3) - 24 January 2017 Added patch information in the Resolution section

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Summary

VMware product updates address OpenSSL security vulnerabilities. Relevant Releases

ESXi 5.5 prior to ESXi550-201406401-SG

  1. Problem Description

a. OpenSSL update for multiple products.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)

  has assigned the names CVE-2014-0224, CVE-2014-0198, 
  CVE-2010-5298, CVE-2014-3470, CVE-2014-0221 and CVE-2014-0195 to
  these issues. The most important of these issues is 
  CVE-2014-0224.

  CVE-2014-0198, CVE-2010-5298 and CVE-2014-3470 are considered to
  be of moderate severity. Exploitation is highly unlikely or is
  mitigated due to the application configuration.

  CVE-2014-0221 and CVE-2014-0195, which are listed in the OpenSSL 
  Security Advisory (see Reference section below), do not affect
  any VMware products. Updating
  the server will mitigate this issue for both the server and all
  affected clients. For readability
  the affected products have been split into 3 tables below, 
  based on the different client-server configurations and
  deployment scenarios.

  MITIGATIONS

  Clients that communicate with a patched or non-vulnerable server
  are not vulnerable to CVE-2014-0224. Applying these patches to 
  affected servers will mitigate the affected clients (See Table 1
  below). can be mitigated by using a secure network such as 
  VPN (see Table 2 below).

  Clients and servers that are deployed on an isolated network are
  less exposed to CVE-2014-0224 (see Table 3 below). The affected
  products are typically deployed to communicate over the
  management network.

  RECOMMENDATIONS

  VMware recommends customers evaluate and deploy patches for
  affected Servers in Table 1 below as these patches become
  available. Patching these servers will remove the ability to
  exploit the vulnerability described in CVE-2014-0224 on both
  clients and servers. VMware recommends customers consider 
  applying patches to products listed in Table 2 & 3 as required.

  Column 4 of the following tables lists the action required to
  remediate the vulnerability in each release, if a solution is
  available.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  ESXi                            5.5       ESXi     ESXi550-
                                                     201406401-SG

  Big Data Extensions             1.1                patch pending 
  Charge Back Manager             2.6                patch pending

  Horizon Workspace Server 
  GATEWAY                         1.8.1              patch pending 
  Horizon Workspace Server 
  GATEWAY                         1.5                patch pending

  Horizon Workspace Server 
  DATA                            1.8.1              patch pending

  Horizon Mirage Edge Gateway     4.4.2              patch pending 
  Horizon View                    5.3.1              patch pending

  Horizon View Feature Pack       5.3 SP2            patch pending

  NSX for Multi-Hypervisor        4.1.2              patch pending 
  NSX for Multi-Hypervisor        4.0.3              patch pending 
  NSX for vSphere                 6.0.4              patch pending 
  NVP                             3.2.2              patch pending 
  vCAC                            6.0.1              patch pending

  vCloud Networking and Security  5.5.2          patch pending 
  vCloud Networking and Security  5.1.2          patch pending

  vFabric Web Server              5.3.4              patch pending

  vCHS - DPS-Data Protection      2.0                patch pending 
  Service

  Table 2
  ========
  Affected clients running a vulnerable version of OpenSSL 0.9.8 
  or 1.0.1 and communicating over an untrusted network.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  vCSA                            5.5                patch pending 
  vCSA                            5.1                patch pending 
  vCSA                            5.0                patch pending


  ESXi                            5.1       ESXi     patch pending 
  ESXi                            5.0       ESXi     patch pending

  Workstation                     10.0.2    any      patch pending 
  Workstation                     9.0.3     any      patch pending 
  Fusion                          6.x       OSX      patch pending 
  Fusion                          5.x       OSX      patch pending 
  Player                          10.0.2    any      patch pending 
  Player                          9.0.3     any      patch pending

  Chargeback Manager              2.5.x              patch pending

  Horizon Workspace Client for    1.8.1    OSX       patch pending 
  Mac
  Horizon Workspace Client for    1.5      OSX       patch pending 
  Mac
  Horizon Workspace Client for    1.8.1    Windows   patch pending 
  Windows       
  Horizon Workspace Client for    1.5      Windows   patch pending

  OVF Tool                        3.5.1              patch pending 
  OVF Tool                        3.0.1              patch pending

  vCenter Operations Manager      5.8.1              patch pending

  vCenter Support Assistant       5.5.0              patch pending 
  vCenter Support Assistant       5.5.1              patch pending

  vCD                             5.1.2              patch pending    
  vCD                             5.1.3              patch pending 
  vCD                             5.5.1.1            patch pending 
  vCenter Site Recovery Manager   5.0.3.1            patch pending

  Table 3
  =======
  The following table lists all affected clients running a
  vulnerable version of OpenSSL 0.9.8 or 1.0.1 and communicating
  over an untrusted network.

  VMware                          Product  Running   Replace with/
  Product                         Version  on        Apply Patch 
  ==============                  =======  =======   =============
  vCenter Server                  5.5       any      patch pending
  vCenter Server                  5.1       any      patch pending
  vCenter Server                  5.0       any      patch pending

  Update Manager                  5.5       Windows  patch pending
  Update Manager                  5.1       Windows  patch pending
  Update Manager                  5.0       Windows  patch pending

  Config Manager (VCM)            5.6                patch pending

  Horizon View Client             5.3.1              patch pending 
  Horizon View Client             4.x                patch pending
  Horizon Workspace               1.8.1              patch pending 
  Horizon Workspace               1.5                patch pending


  ITBM Standard                   1.0.1              patch pending 
  ITBM Standard                   1.0                patch pending

  Studio                          2.6.0.0            patch pending

  Usage Meter                     3.3                patch pending 
  vCenter Chargeback Manager      2.6                patch pending 
  vCenter Converter Standalone    5.5                patch pending 
  vCenter Converter Standalone    5.1                patch pending 
  vCD (VCHS)                      5.6.2              patch pending

  vCenter Site Recovery Manager   5.5.1              patch pending 
  vCenter Site Recovery Manager   5.1.1              patch pending

  vFabric Application Director    5.2.0              patch pending 
  vFabric Application Director    5.0.0              patch pending 
  View Client                     5.3.1              patch pending 
  View Client                     4.x                patch pending
  VIX API                         5.5                patch pending 
  VIX API                         1.12               patch pending

  vMA (Management Assistant)      5.1.0.1            patch pending


  VMware Data Recovery            2.0.3              patch pending

  VMware vSphere CLI              5.5                patch pending

  vSphere Replication             5.5.1              patch pending 
  vSphere Replication             5.6                patch pending 
  vSphere SDK for Perl            5.5                patch pending 
  vSphere Storage Appliance       5.5.1              patch pending 
  vSphere Storage Appliance       5.1.3              patch pending 
  vSphere Support Assistant       5.5.1              patch pending 
  vSphere Support Assistant       5.5.0              patch pending
  vSphere Virtual Disk            5.5                patch pending 
  Development Kit                  
  vSphere Virtual Disk            5.1                patch pending 
  Development Kit
  vSphere Virtual Disk            5.0                patch pending 
  Development Kit
  1. Solution

ESXi 5.5


Download: https://www.vmware.com/patchmgr/download.portal

Release Notes and Remediation Instructions: http://kb.vmware.com/kb/2077359

  1. Change Log

2014-06-10 VMSA-2014-0006 Initial security advisory in conjunction with the release of ESXi 5.5 updates on 2014-06-10


  1. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories http://www.vmware.com/security/advisories

VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html

Twitter https://twitter.com/VMwareSRC

Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04347622

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04347622 Version: 1

HPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network Products including H3C and 3COM Routers and Switches running OpenSSL, Remote Denial of Service (DoS), Code Execution, Unauthorized Access, Modification or Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2014-06-20 Last Updated: 2014-06-20

Potential Security Impact: Remote Denial of Service (DoS), code execution, unauthorized access, modification of information, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Intelligent Management Center (iMC), HP Network Products including 3COM and H3C routers and switches running OpenSSL. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS), execute code, allow unauthorized access, modify or disclose information.

References:

CVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information CVE-2014-0198 Remote Unauthorized Access (only iMC impacted) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information SSRT101561 Note: All products listed are impacted by CVE-2014-0224 . iMC is also impacted by CVE-2014-0198 and CVE-2010-5298

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION section below for a list of impacted products.

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION On June 5th 2014, OpenSSL.org issued an advisory with several CVE vulnerabilities. HP Networking is working to release fixes for these vulnerabilities that impact the products in the table below. As fixed software is made available, this security bulletin will be updated to show the fixed versions. Until the software fixes are available, HP Networking is providing the following information including possible workarounds to mitigate the risks of these vulnerabilities.

Workarounds

HP Networking equipment is typically deployed inside firewalls and access to management interfaces and other protocols is more tightly controlled than in public environments.

Following the guidelines in the Hardening Comware-based devices can help to further reduce man-in-the-middle opportunities:

http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536 920

For an HP Networking device acting as an OpenSSL Server, using a patched OpenSSL client or non-OpenSSL client eliminates the risk.

Protocol Notes

The following details the protocols that use OpenSSL in Comware v5 and Comware v7:

Comware V7:

Server:

FIPS/HTTPS/Load Balancing/Session Initiation Protocol

Client:

Load Balancing/OpenFlow/Session Initiation Protocol/State Machine Based Anti-Spoofing/Dynamic DNS

Comware V5:

Server:

CAPWAP/EAP/SSLVPN

Client:

Dynamic DNS

Family Fixed Version HP Branded Products Impacted H3C Branded Products Impacted 3Com Branded Products Impacted

12900 Switch Series Fix in progress use mitigations JG619A HP FF 12910 Switch AC Chassis JG621A HP FF 12910 Main Processing Unit JG632A HP FF 12916 Switch AC Chassis JG634A HP FF 12916 Main Processing Unit

12500 Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JC808A HP 12500 TAA Main Processing Unit H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)

12500 (Comware v7) Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JG497A HP 12500 MPU w/Comware V7 OS JG782A HP FF 12508E AC Switch Chassis JG783A HP FF 12508E DC Switch Chassis JG784A HP FF 12518E AC Switch Chassis JG785A HP FF 12518E DC Switch Chassis JG802A HP FF 12500E MPU H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)

11900 Switch Series Fix in progress use mitigations JG608A HP FF 11908-V Switch Chassis JG609A HP FF 11900 Main Processing Unit

10500 Switch Series (Comware v5) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC614A HP 10500 Main Processing Unit JC748A HP 10512 Switch Chassis JG375A HP 10500 TAA Main Processing Unit JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis

10500 Switch Series (Comware v7) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC748A HP 10512 Switch Chassis JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis JG496A HP 10500 Type A MPU w/Comware v7 OS

9500E Fix in progress use mitigations JC124A HP A9508 Switch Chassis JC124B HP 9505 Switch Chassis JC125A HP A9512 Switch Chassis JC125B HP 9512 Switch Chassis JC474A HP A9508-V Switch Chassis JC474B HP 9508-V Switch Chassis H3C S9505E Routing-Switch Chassis (0235A0G6) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9512E Routing-Switch Chassis (0235A0G7) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9505E Chassis w/ Fans (0235A38P) H3C S9512E Chassis w/ Fans (0235A38R)

Router 8800 Fix in progress use mitigations JC147A HP A8802 Router Chassis JC147B HP 8802 Router Chassis JC148A HP A8805 Router Chassis JC148B HP 8805 Router Chassis JC149A HP A8808 Router Chassis JC149B HP 8808 Router Chassis JC150A HP A8812 Router Chassis JC150B HP 8812 Router Chassis JC141A HP 8802 Main Control Unit Module JC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod JC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod H3C SR8805 10G Core Router Chassis (0235A0G8) H3C SR8808 10G Core Router Chassis (0235A0G9) H3C SR8812 10G Core Router Chassis (0235A0GA) H3C SR8802 10G Core Router Chassis (0235A0GC) H3C SR8802 10G Core Router Chassis (0235A31B) H3C SR8805 10G Core Router Chassis (0235A31C) H3C SR8808 10G Core Router Chassis (0235A31D) H3C SR8812 10G Core Router Chassis (0235A31E)

7500 Switch Series Fix in progress use mitigations JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T JC697A HP A7502 TAA Main Processing Unit JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE JC700A HP A7500 384 Gbps TAA Fabric / MPU JC701A HP A7510 768 Gbps TAA Fabric / MPU JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports JD194A HP 384 Gbps Fabric A7500 Module JD194B HP 7500 384Gbps Fabric Module JD195A HP 7500 384Gbps Advanced Fabric Module JD196A HP 7502 Fabric Module JD220A HP 7500 768Gbps Fabric Module JD238A HP A7510 Switch Chassis JD238B HP 7510 Switch Chassis JD239A HP A7506 Switch Chassis JD239B HP 7506 Switch Chassis JD240A HP A7503 Switch Chassis JD240B HP 7503 Switch Chassis JD241A HP A7506 Vertical Switch Chassis JD241B HP 7506-V Switch Chassis JD242A HP A7502 Switch Chassis JD242B HP 7502 Switch Chassis JD243A HP A7503 Switch Chassis w/1 Fabric Slot JD243B HP 7503-S Switch Chassis w/1 Fabric Slot H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4) H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2) H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5) H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1) H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3) H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0) H3C S7502E Chassis w/ fans (0235A29A) H3C S7503E Chassis w/ fans (0235A27R) H3C S7503E-S Chassis w/ fans (0235A33R) H3C S7506E Chassis w/ fans (0235A27Q) H3C S7506E-V Chassis w/ fans (0235A27S)

HSR6800 Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU

HSR6800 Russian Version Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU

HSR6602 Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router

HSR6602 Russian Version Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router

A6600 Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

A6600 Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

6600 MCP Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

6600 MCP Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)

5920 Switch Series Fix in progress use mitigations JG296A HP 5920AF-24XG Switch JG555A HP 5920AF-24XG TAA Switch

5900 Switch Series Fix in progress use mitigations JC772A HP 5900AF-48XG-4QSFP+ Switch JG336A HP 5900AF-48XGT-4QSFP+ Switch JG510A HP 5900AF-48G-4XG-2QSFP+ Switch JG554A HP 5900AF-48XG-4QSFP+ TAA Switch JG838A HP FF 5900CP-48XG-4QSFP+ Switch

5900 Virtual Switch Fix in progress use mitigations JG814AAE HP Virtual Switch 5900v VMware E-LTU JG815AAE HP VSO SW for 5900v VMware E-LTU

5830 Switch Series Fix in progress use mitigations JC691A HP A5830AF-48G Switch w/1 Interface Slot JC694A HP A5830AF-96G Switch JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot JG374A HP 5830AF-96G TAA Switch

5820 Switch Series Fix in progress use mitigations JC102A HP 5820-24XG-SFP+ Switch JC106A HP 5820-14XG-SFP+ Switch with 2 Slots JG219A HP 5820AF-24XG Switch JG243A HP 5820-24XG-SFP+ TAA-compliant Switch JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media modules Plus OSM (0235A37L) H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T (RJ45) (0235A370)

5800 Switch Series Fix in progress use mitigations JC099A HP 5800-24G-PoE Switch JC100A HP 5800-24G Switch JC101A HP 5800-48G Switch with 2 Slots JC103A HP 5800-24G-SFP Switch JC104A HP 5800-48G-PoE Switch JC105A HP 5800-48G Switch JG225A HP 5800AF-48G Switch JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots JG254A HP 5800-24G-PoE+ TAA-compliant Switch JG255A HP 5800-24G TAA-compliant Switch JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot JG258A HP 5800-48G TAA Switch w 1 Intf Slot H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot (0235A36U) H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP Plus ) Plus 1 media module PoE (0235A36S) H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus media module (no power) (0235A374) H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus ) Plus media module (0235A379) H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module (0235A378) H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM (0235A36W)

5500 HI Switch Series Fix in progress use mitigations JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt

5500 EI Switch Series Fix in progress use mitigations JD373A HP 5500-24G DC EI Switch JD374A HP 5500-24G-SFP EI Switch JD375A HP 5500-48G EI Switch JD376A HP 5500-48G-PoE EI Switch JD377A HP 5500-24G EI Switch JD378A HP 5500-24G-PoE EI Switch JD379A HP 5500-24G-SFP DC EI Switch JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts H3C S5500-28C-EI Ethernet Switch (0235A253) H3C S5500-28F-EI Eth Switch AC Single (0235A24U) H3C S5500-52C-EI Ethernet Switch (0235A24X) H3C S5500-28C-EI-DC Ethernet Switch (0235A24S) H3C S5500-28C-PWR-EI Ethernet Switch (0235A255) H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259) H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)

5500 SI Switch Series Fix in progress use mitigations JD369A HP 5500-24G SI Switch JD370A HP 5500-48G SI Switch JD371A HP 5500-24G-PoE SI Switch JD372A HP 5500-48G-PoE SI Switch JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts H3C S5500-28C-SI Ethernet Switch (0235A04U) H3C S5500-52C-SI Ethernet Switch (0235A04V) H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H) H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)

5120 EI Switch Series Fix in progress use mitigations JE066A HP 5120-24G EI Switch JE067A HP 5120-48G EI Switch JE068A HP 5120-24G EI Switch with 2 Slots JE069A HP 5120-48G EI Switch with 2 Slots JE070A HP 5120-24G-PoE EI Switch with 2 Slots JE071A HP 5120-48G-PoE EI Switch with 2 Slots JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ) H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS) H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR) H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT) H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU) H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)

5120 SI switch Series Fix in progress use mitigations JE072A HP 5120-48G SI Switch JE073A HP 5120-16G SI Switch JE074A HP 5120-24G SI Switch JG091A HP 5120-24G-PoE+ (370W) SI Switch JG092A HP 5120-24G-PoE+ (170W) SI Switch H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W) H3C S5120-20P-SI L2 16GE Plus 4SFP (0235A42B) H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D) H3C S5120-28P-HPWR-SI (0235A0E5) H3C S5120-28P-PWR-SI (0235A0E3)

4800 G Switch Series Fix in progress use mitigations JD007A HP 4800-24G Switch JD008A HP 4800-24G-PoE Switch JD009A HP 4800-24G-SFP Switch JD010A HP 4800-48G Switch JD011A HP 4800-48G-PoE Switch

3Com Switch 4800G 24-Port (3CRS48G-24-91) 3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91) 3Com Switch 4800G 48-Port (3CRS48G-48-91) 3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91) 3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)

4510G Switch Series Fix in progress use mitigations JF428A HP 4510-48G Switch JF847A HP 4510-24G Switch

3Com Switch 4510G 48 Port (3CRS45G-48-91) 3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91) 3Com Switch E4510-24G (3CRS45G-24-91)

4210G Switch Series Fix in progress use mitigations JF844A HP 4210-24G Switch JF845A HP 4210-48G Switch JF846A HP 4210-24G-PoE Switch

3Com Switch 4210-24G (3CRS42G-24-91) 3Com Switch 4210-48G (3CRS42G-48-91) 3Com Switch E4210-24G-PoE (3CRS42G-24P-91)

3610 Switch Series Fix in progress use mitigations JD335A HP 3610-48 Switch JD336A HP 3610-24-4G-SFP Switch JD337A HP 3610-24-2G-2G-SFP Switch JD338A HP 3610-24-SFP Switch H3C S3610-52P - model LS-3610-52P-OVS (0235A22C) H3C S3610-28P - model LS-3610-28P-OVS (0235A22D) H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E) H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)

3600 V2 Switch Series Fix in progress use mitigations JG299A HP 3600-24 v2 EI Switch JG300A HP 3600-48 v2 EI Switch JG301A HP 3600-24-PoE+ v2 EI Switch JG301B HP 3600-24-PoE+ v2 EI Switch JG302A HP 3600-48-PoE+ v2 EI Switch JG302B HP 3600-48-PoE+ v2 EI Switch JG303A HP 3600-24-SFP v2 EI Switch JG304A HP 3600-24 v2 SI Switch JG305A HP 3600-48 v2 SI Switch JG306A HP 3600-24-PoE+ v2 SI Switch JG306B HP 3600-24-PoE+ v2 SI Switch JG307A HP 3600-48-PoE+ v2 SI Switch JG307B HP 3600-48-PoE+ v2 SI Switch

3100V2 Fix in progress use mitigations JD313B HP 3100-24-PoE v2 EI Switch JD318B HP 3100-8 v2 EI Switch JD319B HP 3100-16 v2 EI Switch JD320B HP 3100-24 v2 EI Switch JG221A HP 3100-8 v2 SI Switch JG222A HP 3100-16 v2 SI Switch JG223A HP 3100-24 v2 SI Switch

3100V2-48 Fix in progress use mitigations JG315A HP 3100-48 v2 Switch

1910 Fix in progress use mitigations JE005A HP 1910-16G Switch JE006A HP 1910-24G Switch JE007A HP 1910-24G-PoE (365W) Switch JE008A HP 1910-24G-PoE(170W) Switch JE009A HP 1910-48G Switch JG348A HP 1910-8G Switch JG349A HP 1910-8G-PoE+ (65W) Switch JG350A HP 1910-8G-PoE+ (180W) Switch 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293) 3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093) 3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893) 3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93) 3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)

1810v1 P2 Fix in progress use mitigations J9449A HP 1810-8G Switch J9450A HP 1810-24G Switch

1810v1 PK Fix in progress use mitigations J9660A HP 1810-48G Switch

MSR20 Fix in progress use mitigations JD432A HP A-MSR20-21 Multi-Service Router JD662A HP MSR20-20 Multi-Service Router JD663A HP MSR20-21 Multi-Service Router JD663B HP MSR20-21 Router JD664A HP MSR20-40 Multi-Service Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326) H3C MSR 20-20 (0235A19H) H3C MSR 20-21 (0235A325) H3C MSR 20-40 (0235A19K) H3C MSR-20-21 Router (0235A19J)

MSR20-1X Fix in progress use mitigations JD431A HP MSR20-10 Router JD667A HP MSR20-15 IW Multi-Service Router JD668A HP MSR20-13 Multi-Service Router JD669A HP MSR20-13 W Multi-Service Router JD670A HP MSR20-15 A Multi-Service Router JD671A HP MSR20-15 AW Multi-Service Router JD672A HP MSR20-15 I Multi-Service Router JD673A HP MSR20-11 Multi-Service Router JD674A HP MSR20-12 Multi-Service Router JD675A HP MSR20-12 W Multi-Service Router JD676A HP MSR20-12 T1 Multi-Service Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router JG209A HP MSR20-12-T-W Router (NA) JG210A HP MSR20-13-W Router (NA) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) H3C MSR 20-10 (0235A0A7) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-11 (0235A31V) H3C MSR 20-12 (0235A32E) H3C MSR 20-12 T1 (0235A32B) H3C MSR 20-13 (0235A31W) H3C MSR 20-13 W (0235A31X) H3C MSR 20-15 A (0235A31Q) H3C MSR 20-15 A W (0235A31R) H3C MSR 20-15 I (0235A31N) H3C MSR 20-15 IW (0235A31P) H3C MSR20-12 W (0235A32G)

MSR30 Fix in progress use mitigations JD654A HP MSR30-60 POE Multi-Service Router JD657A HP MSR30-40 Multi-Service Router JD658A HP MSR30-60 Multi-Service Router JD660A HP MSR30-20 POE Multi-Service Router JD661A HP MSR30-40 POE Multi-Service Router JD666A HP MSR30-20 Multi-Service Router JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF232A HP RT-MSR3040-AC-OVS-AS-H3 JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S) H3C MSR 30-20 (0235A19L) H3C MSR 30-20 POE (0235A239) H3C MSR 30-40 (0235A20J) H3C MSR 30-40 POE (0235A25R) H3C MSR 30-60 (0235A20K) H3C MSR 30-60 POE (0235A25S) H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)

MSR30-16 Fix in progress use mitigations JD659A HP MSR30-16 POE Multi-Service Router JD665A HP MSR30-16 Multi-Service Router JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) H3C MSR 30-16 (0235A237) H3C MSR 30-16 POE (0235A238)

MSR30-1X Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) H3C RT-MSR3011-AC-OVS-H3 (0235A29L)

MSR50 Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR5040-DC-OVS-H3C (0235A20P) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L)

MSR50-G2 Fix in progress use mitigations JD429A HP MSR50 G2 Processor Module JD429B HP MSR50 G2 Processor Module H3C H3C MSR 50 Processor Module-G2 (0231A84Q) H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD(0231A0KL)

MSR20 Russian version Fix in progress use mitigations JD663B HP MSR20-21 Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326)

MSR20-1X Russian version Fix in progress use mitigations JD431A HP MSR20-10 Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router H3C MSR 20-10 (0235A0A7) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)

MSR30 Russian version Fix in progress use mitigations JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)

MSR30-1X Russian version Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C RT-MSR3011-AC-OVS-H3 (0235A29L) H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)

MSR30-16 Russian version Fix in progress use mitigations JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)

MSR50 Russian version Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR 50 Processor Module (0231A791) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR5040-DC-OVS-H3C (0235A20P)

MSR50 G2 Russian version Fix in progress use mitigations JD429B HP MSR50 G2 Processor Module H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL)

MSR9XX Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr JG207A HP MSR900-W Router (NA) JG208A HP MSR920-W Router (NA) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)

MSR9XX Russian version Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)

MSR93X Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router

MSR93X Russian version Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router

MSR1000 Fix in progress use mitigations JG732A HP MSR1003-8 AC Router

MSR2000 Fix in progress use mitigations JG411A HP MSR2003 AC Router

MSR3000 Fix in progress use mitigations JG404A HP MSR3064 Router JG405A HP MSR3044 Router JG406A HP MSR3024 AC Router JG409A HP MSR3012 AC Router JG861A HP MSR3024 TAA-compliant AC Router

MSR4000 Fix in progress use mitigations JG402A HP MSR4080 Router Chassis JG403A HP MSR4060 Router Chassis JG412A HP MSR4000 MPU-100 Main Processing Unit

F5000 Fix in progress use mitigations JG216A HP F5000 Firewall Standalone Chassis JD259A HP A5000-A5 VPN Firewall Chassis H3C SecPath F5000-A5 Host System (0150A0AG)

U200S and CS Fix in progress use mitigations JD268A HP 200-CS UTM Appliance JD273A HP U200-S UTM Appliance H3C SecPath U200-S (0235A36N)

U200A and M Fix in progress use mitigations JD274A HP 200-M UTM Appliance JD275A HP U200-A UTM Appliance H3C SecPath U200-A (0235A36Q)

F1000A and S Fix in progress use mitigations JD270A HP S1000-S VPN Firewall Appliance JD271A HP S1000-A VPN Firewall Appliance JG213A HP F1000-S-EI VPN Firewall Appliance JG214A HP F1000-A-EI VPN Firewall Appliance

SecBlade FW Fix in progress use mitigations JC635A HP 12500 VPN Firewall Module JD245A HP 9500 VPN Firewall Module JD249A HP 10500/7500 Advanced VPN Firewall Mod JD250A HP 6600 Firewall Processing Rtr Module JD251A HP 8800 Firewall Processing Module JD255A HP 5820 VPN Firewall Module H3C S9500E SecBlade VPN Firewall Module (0231A0AV) H3C S7500E SecBlade VPN Firewall Module (0231A832) H3C SR66 Gigabit Firewall Module (0231A88A) H3C SR88 Firewall Processing Module (0231A88L) H3C S5820 SecBlade VPN Firewall Module (0231A94J)

F1000E Fix in progress use mitigations JD272A HP S1000-E VPN Firewall Appliance

VSR1000 Fix in progress use mitigations JG810AAE HP VSR1001 Virtual Services Router JG811AAE HP VSR1001 Virtual Services Router JG812AAE HP VSR1004 Virtual Services Router JG813AAE HP VSR1008 Virtual Services Router

WX5002/5004 Fix in progress use mitigations JD441A HP 5800 ACM for 64-256 APs JD447B HP WX5002 Access Controller JD448A HP A-WX5004 Access Controller JD448B HP WX5004 Access Controller JD469A HP A-WX5004 (3Com) Access Controller JG261A HP 5800 Access Controller OAA TAA Mod

HP 850/870 Fix in progress use mitigations JG723A HP 870 Unified Wired-WLAN Appliance JG725A HP 870 Unifd Wrd-WLAN TAA Applnc

HP 830 Fix in progress use mitigations JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch

HP 6000 Fix in progress use mitigations JG639A HP 10500/7500 20G Unified Wired-WLAN Mod JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod

M220 Fix in progress use mitigations J9798A HP M220 802.11n AM Access Point J9799A HP M220 802.11n WW Access Point

NGFW Fix in progress use mitigations JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic JC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic JC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic JC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic JC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic

iMC UAM 7.0 Fix in progress use mitigations JD144A HP IMC UAM S/W Module w/200-User License JF388A HP IMC UAM S/W Module w/200-user License JD435A HP IMC EAD Client Software JF388AAE HP IMC UAM S/W Module w/200-user E-LTU JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU

iMC EAD 7.0 Fix in progress use mitigations JF391AAE HP IMC EAD S/W Module w/200-user E-LTU JG754AAE HP IMC EAD SW Module w/ 50-user E-LTU JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License JF391A HP IMC EAD S/W Module w/200-user License

iMC PLAT 7.0 Fix in progress use mitigations JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU JG747AAE HP IMC Standard Software Platform with 50-node E-LTU JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU JD125A HP IMC Standard Edition Software Platform with 100-node License JD815A HP IMC Standard Edition Software Platform with 100-node License JD816A HP A-IMC Standard Edition Software DVD Media JF377A HP IMC Standard Edition Software Platform with 100-node License JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU TJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL not HPNs) JF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU JG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU JD126A HP A-IMC Enterprise Software Platform with 200-node License JD808A HP A-IMC Enterprise Software Platform with 200-node License JD814A HP A-IMC Enterprise Edition Software DVD Media JF378A HP IMC Enterprise Edition Software Platform with 200-node License JG546AAE HP IMC Basic SW Platform w/50-node E-LTU JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU JG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU JG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition E-LTU JG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance Software E-LTU

HISTORY Version:1 (rev.1) - 20 June 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 7) - x86_64

  1. Corrected: 2014-05-13 23:19:16 UTC (stable/10, 10.0-STABLE) 2014-05-13 23:22:28 UTC (releng/10.0, 10.0-RELEASE-p3) CVE Name: CVE-2014-0198

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

The TLS protocol supports an alert protocol which can be used to signal the other party with certain failures in the protocol context that may require immediate termination of the connection.

II. Problem Description

An attacker can trigger generation of an SSL alert which could cause a null pointer deference.

III.

IV.

The FreeBSD base system service daemons and utilities do not use the SSL_MODE_RELEASE_BUFFERS mode. However, many third party software uses this mode to reduce their memory footprint and may therefore be affected by this issue.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

fetch http://security.FreeBSD.org/patches/SA-14:10/openssl.patch

fetch http://security.FreeBSD.org/patches/SA-14:10/openssl.patch.asc

gpg --verify openssl.patch.asc

b) Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/10/ r265986 releng/10.0/ r265987


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0244",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "linux enterprise software development kit",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "linux enterprise workstation extension",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "12.3",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.1",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 1,
            vendor: "suse",
            version: "12",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "8.0",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "7.0",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8.106",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.9",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58200",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "junos os 13.1r4-s3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 12.1r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.5",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.2",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "cp1543-1",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "junos 12.1r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "60000",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.2",
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "junos 12.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ive os 7.4r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "junos os 11.4r12-s4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v2-480",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "junos 11.4r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "uacos c4.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msr3000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.4",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.3",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.2",
         },
         {
            model: "m220 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58300",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "4800g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "secure analytics 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "119000",
         },
         {
            model: "secure analytics 2014.2r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.12",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "junos 13.1r3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "10",
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "oneview",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.10",
         },
         {
            model: "f1000a and s family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "u200a and m family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.10",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "850/8700",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "junos 11.4r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "junos d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.3",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.1",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "hsr6602 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.2",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.5",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ive os 8.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "msr93x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.0",
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wx5002/5004 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos 11.4r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "a6600 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "junos 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vsr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.3r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "junos 12.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.2",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "simatic wincc oa",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "3.8",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "junos 13.2r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos r7",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.9",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "msr20 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.1r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 13.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 11.4r10-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "junos 5.0r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129000",
         },
         {
            model: "fortios build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "hsr6800 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.1",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "msr20 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "msr1000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "secblade iii",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 10.4r",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "junos 12.1r8-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "ssl vpn 8.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "msr1000 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "junos 13.1r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "(comware family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12500v7)0",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.2",
         },
         {
            model: "cp1543-1",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.1.25",
         },
         {
            model: "ive os 7.4r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "secure analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "msr30 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "strm 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "junos pulse 5.0r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "junos 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "sbr global enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jsa 2014.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.2",
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7900.00",
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "f1000e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos os 12.2r9",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19200",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.3",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "hsr6602 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.0",
         },
         {
            model: "secure analytics 2014.2r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "junos 13.3r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.6",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51200",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "junos 12.1r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "simatic s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "1.5.0",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "msr50 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "strm",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2012.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.4",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr50 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.1",
         },
         {
            model: "junos 12.1x45-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "junos 13.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "junos 13.2r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "u200s and cs family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "security threat response manager 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.3",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "hsr6800 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.5",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v5)0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.12",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos os 12.3r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "simatic s7-1500",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "1.6",
         },
         {
            model: "strm/jsa 2013.2r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ngfw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.3",
         },
         {
            model: "junos 10.4r16",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "junos 12.3r4-s3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ssl vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.203",
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr50-g2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "ive os 7.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "junos 5.0r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ive os 8.0r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "11.16",
         },
         {
            model: "junos os 14.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "junos os 13.2r5-s1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sbr enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "junos os 12.1x46-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uacos c5.0r4.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "webex messenger service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 13.1r.3-s1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "58000",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.7",
         },
         {
            model: "junos os 12.1x46-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3100v20",
         },
         {
            model: "junos 12.1x45-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "tivoli storage flashcopy manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "uacos c5.0",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "strm/jsa",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "imc uam",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "ssl vpn 7.4r11.1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 10.4s",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.6",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "ive os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "intelligent management center",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "switch series (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10500v7)0",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 11.4r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.4",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9500e family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr30-16 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "f5000 c",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.2",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "f5000 s",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "simatic s7-1500",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "msr20-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "si switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "ape",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security threat response manager 2012.1r8",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.6",
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "ftp server",
            scope: "ne",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.3",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "junos 12.1x45-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "rox",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "20",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.4",
         },
         {
            model: "junos 10.4s15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "36100",
         },
         {
            model: "junos 13.2r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ive os 7.4r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "hi switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "msr30-1x russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.7",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "msr9xx family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "msr2000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "msr30 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "junos 12.2r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "125000",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.4",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "msr30-16 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "imc ead",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.00",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3600v20",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "9.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "fortios b064",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "10.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "fortios",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "msr4000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.2r8",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.6",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "mcp russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.1",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "a6600 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "junos 12.1r11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "f5000 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19100",
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos r11",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.4x27.62",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "7.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "pk family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "junos os 13.3r3",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59200",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos 11.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x45-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "4210g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "webapp secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "security threat response manager",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2013.2",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ei switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "55000",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "junos 13.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "junos d15",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45-",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "junos os 12.1x47-d15",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59000",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "mcp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66000",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "75000",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8300",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "junos 12.2r8-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.2",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "secblade fw family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "junos 10.4r15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "uacos c4.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos pulse 4.0r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "junos 14.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "p2 family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1810v10",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "junos 10.0s25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x45",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.2",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "msr50 g2 russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "junos 10.4r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos 12.3r4-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "8.1",
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "russian version",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "66020",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.4",
         },
         {
            model: "junos r5",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.2",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "6.0",
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "blackberry link",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "1.2",
         },
         {
            model: "oneview",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.05",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "msr20-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "real-time compression appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9.107",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "msr30-1x family",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "4510g switch series",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "junos 12.1r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ive os 8.0r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos os 12.1x44-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "67193",
         },
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Marc Deslauriers",
      sources: [
         {
            db: "BID",
            id: "67193",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2014-0198",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-0198",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0198",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-0198",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to crash the application, resulting  in denial-of-service conditions. \nHP Systems Insight Manager v7.2, v7.2.1, v7.2.2, v7.3, v7.3.0a, and v7.3.1\nare bundled with the following software products:\n\nHP Smart Update Manager (SUM) 5.3.5 through 6.3.1\nHP System Management Homepage (SMH) v7.2.3 and 7.3.2 for Linux and Windows\nHP Version Control Agent (VCA) v7.3.2 for Windows\nHP Version Control Agent (VCA) v7.3.2 for Linux\nHP Version Control Repository Manager (VCRM) v7.2.0, v7.2.1, v7.2.2, v7.3.0,\nand v7.3.1 for Windows\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve these\nvulnerabilities in HP Systems Insight Manager (SIM). \n\nHP Systems Insight Manager v7.3 Hotfix kit\nHP Systems Insight Manager v7.2 Hotfix kit (The HP Systems Insight Manager\nv7.2 Hotfix kit is currently unavailable, but will be released at a later\ndate. \n\nhttp://h18013.www1.hp.com/products/servers/management/hpsim/download.html\n\nNOTE: No reboot of the system is required after applying the HP SIM Hotfix\nkit. \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1\n before 1.0.1j allows remote attackers to cause a denial of service\n (memory consumption) via a crafted handshake message (CVE-2014-3513). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue\n became relevant after the CVE-2014-3568 fix (CVE-2014-3569). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k\n does not enforce certain constraints on certificate data, which allows\n remote attackers to defeat a fingerprint-based certificate-blacklist\n protection mechanism by including crafted data within a\n certificate&#039;s unsigned portion, related to crypto/asn1/a_verify.c,\n crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c\n (CVE-2014-8275). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS\nkz0ex6eI6hA6qSwklA2NoXY=\n=GYjX\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201407-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: OpenSSL: Multiple vulnerabilities\n     Date: July 27, 2014\n     Bugs: #512506\n       ID: 201407-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, possibly allowing\nremote attackers to execute arbitrary code. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1h-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-5298\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298\n[ 2 ] CVE-2014-0195\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195\n[ 3 ] CVE-2014-0198\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198\n[ 4 ] CVE-2014-0221\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221\n[ 5 ] CVE-2014-0224\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224\n[ 6 ] CVE-2014-3470\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470\n[ 7 ] OpenSSL Security Advisory [05 Jun 2014]\n      http://www.openssl.org/news/secadv_20140605.txt\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201407-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2014:0625-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0625.html\nIssue date:        2014-06-05\nCVE Names:         CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 \n                   CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. A remote attacker could possibly use this flaw to execute\narbitrary code on a DTLS client or server. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues. \nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGröbert and Ivan Fratrić of Google as the original reporters of\nCVE-2014-3470. \n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free\n1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake\n1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment\n1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-5298.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0195.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0198.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0221.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0224.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3470.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/site/articles/904433\nhttps://access.redhat.com/site/solutions/905793\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB\npJJhdOUzRUL8R2haDM4xrsk=\n=hZF8\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. These vulnerabilities include: \n\n* The SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"POODLE\", which could be exploited remotely\nresulting in disclosure of information. \n\n  - HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2010-5298\n      4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\n      4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)\n\n    CVE-2014-0076\n      4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n      1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2014-0195\n      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-0198\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0221\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0224\n      6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-3470\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-3566\n      3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\n      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2016-0705\n      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE recommends applying the following software updates to resolve the\nvulnerabilities in the impacted versions of HPE StoreVirtual products running\nHPE LeftHand OS. \n\nLeftHand OS v11.5 - Patches 45019-00 and 45020 \nLeftHand OS v12.0 - Patches 50016-00 and 50017-00 \nLeftHand OS v12.5 - Patch 55016-00 \nLeftHand OS v12.6 - Patch 56002-00 \n\n**Notes:**\n\nThese patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision\nto OpenSSL v1.0.1e 48. \nThese patches migrate Certificate Authority Hashing Algorithm from a weak\nhashing algorithm SHA1 to the stronger hashing algorithm SHA256. \n\nHISTORY\n\nVersion:1 (rev.1) - 7 October 2016 Initial release\n\nVersion:2 (rev.2) - 13 October 2016 Updated the Resolution section\n\nVersion:3 (rev.3) - 24 January 2017 Added patch information in the Resolution\nsection\n\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy. Summary\n\n   VMware product updates address OpenSSL security vulnerabilities. Relevant Releases\n\n   ESXi 5.5 prior to ESXi550-201406401-SG\n\n\n3. Problem Description\n\n   a. OpenSSL update for multiple products. \n \n      The Common Vulnerabilities and Exposures project (cve.mitre.org)\n\n      has assigned the names CVE-2014-0224, CVE-2014-0198, \n      CVE-2010-5298, CVE-2014-3470, CVE-2014-0221 and CVE-2014-0195 to\n      these issues. The most important of these issues is \n      CVE-2014-0224. \n\n      CVE-2014-0198, CVE-2010-5298 and CVE-2014-3470 are considered to\n      be of moderate severity. Exploitation is highly unlikely or is\n      mitigated due to the application configuration. \n\n      CVE-2014-0221 and CVE-2014-0195, which are listed in the OpenSSL \n      Security Advisory (see Reference section below), do not affect\n      any VMware products. Updating\n      the server will mitigate this issue for both the server and all\n      affected clients. For readability\n      the affected products have been split into 3 tables below, \n      based on the different client-server configurations and\n      deployment scenarios. \n\n      MITIGATIONS\n\n      Clients that communicate with a patched or non-vulnerable server\n      are not vulnerable to CVE-2014-0224. Applying these patches to \n      affected servers will mitigate the affected clients (See Table 1\n      below). can be mitigated by using a secure network such as \n      VPN (see Table 2 below). \n      \n      Clients and servers that are deployed on an isolated network are\n      less exposed to CVE-2014-0224 (see Table 3 below). The affected\n      products are typically deployed to communicate over the\n      management network. \n\n      RECOMMENDATIONS\n\n      VMware recommends customers evaluate and deploy patches for\n      affected Servers in Table 1 below as these patches become\n      available. Patching these servers will remove the ability to\n      exploit the vulnerability described in CVE-2014-0224 on both\n      clients and servers. VMware recommends customers consider \n      applying patches to products listed in Table 2 & 3 as required. \n\n      Column 4 of the following tables lists the action required to\n      remediate the vulnerability in each release, if a solution is\n      available. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      ESXi                            5.5       ESXi     ESXi550-\n                                                         201406401-SG \n\n      Big Data Extensions             1.1                patch pending \n      Charge Back Manager             2.6                patch pending \n\n      Horizon Workspace Server \n      GATEWAY                         1.8.1              patch pending \n      Horizon Workspace Server \n      GATEWAY                         1.5                patch pending \n\n      Horizon Workspace Server \n      DATA                            1.8.1              patch pending \n\n      Horizon Mirage Edge Gateway     4.4.2              patch pending \n      Horizon View                    5.3.1              patch pending \n\n      Horizon View Feature Pack       5.3 SP2            patch pending \n\n      NSX for Multi-Hypervisor        4.1.2              patch pending \n      NSX for Multi-Hypervisor        4.0.3              patch pending \n      NSX for vSphere                 6.0.4              patch pending \n      NVP                             3.2.2              patch pending \n      vCAC                            6.0.1              patch pending \n\n      vCloud Networking and Security  5.5.2 \t\t patch pending \n      vCloud Networking and Security  5.1.2 \t\t patch pending \n\n      vFabric Web Server              5.3.4              patch pending \n\n      vCHS - DPS-Data Protection      2.0                patch pending \n      Service\n\n      Table 2\n      ========\n      Affected clients running a vulnerable version of OpenSSL 0.9.8 \n      or 1.0.1 and communicating over an untrusted network. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      vCSA                            5.5                patch pending \n      vCSA                            5.1                patch pending \n      vCSA                            5.0                patch pending \n\n\n      ESXi                            5.1       ESXi     patch pending \n      ESXi                            5.0       ESXi     patch pending  \n\n      Workstation                     10.0.2    any      patch pending \n      Workstation                     9.0.3     any      patch pending \n      Fusion                          6.x       OSX      patch pending \n      Fusion                          5.x       OSX      patch pending \n      Player                          10.0.2    any      patch pending \n      Player                          9.0.3     any      patch pending \n\n      Chargeback Manager              2.5.x              patch pending \n\n      Horizon Workspace Client for    1.8.1    OSX       patch pending \n      Mac\n      Horizon Workspace Client for    1.5      OSX       patch pending \n      Mac\n      Horizon Workspace Client for    1.8.1    Windows   patch pending \n      Windows       \n      Horizon Workspace Client for    1.5      Windows   patch pending \n\n      OVF Tool                        3.5.1              patch pending \n      OVF Tool                        3.0.1              patch pending \n\n      vCenter Operations Manager      5.8.1              patch pending \n\n      vCenter Support Assistant       5.5.0              patch pending \n      vCenter Support Assistant       5.5.1              patch pending \n      \n      vCD                             5.1.2              patch pending    \n      vCD                             5.1.3              patch pending \n      vCD                             5.5.1.1            patch pending \n      vCenter Site Recovery Manager   5.0.3.1            patch pending \n\n      Table 3\n      =======\n      The following table lists all affected clients running a\n      vulnerable version of OpenSSL 0.9.8 or 1.0.1 and communicating\n      over an untrusted network. \n\n      VMware                          Product  Running   Replace with/\n      Product                         Version  on        Apply Patch \n      ==============                  =======  =======   =============\n      vCenter Server                  5.5       any      patch pending\n      vCenter Server                  5.1       any      patch pending\n      vCenter Server                  5.0       any      patch pending\n\n      Update Manager                  5.5       Windows  patch pending\n      Update Manager                  5.1       Windows  patch pending\n      Update Manager                  5.0       Windows  patch pending \n\n      Config Manager (VCM)            5.6                patch pending \n\n      Horizon View Client             5.3.1              patch pending \n      Horizon View Client             4.x                patch pending\n      Horizon Workspace               1.8.1              patch pending \n      Horizon Workspace               1.5                patch pending     \n \n   \n      ITBM Standard                   1.0.1              patch pending \n      ITBM Standard                   1.0                patch pending \n   \n      Studio                          2.6.0.0            patch pending \n    \n      Usage Meter                     3.3                patch pending \n      vCenter Chargeback Manager      2.6                patch pending \n      vCenter Converter Standalone    5.5                patch pending \n      vCenter Converter Standalone    5.1                patch pending \n      vCD (VCHS)                      5.6.2              patch pending \n      \n      vCenter Site Recovery Manager   5.5.1              patch pending \n      vCenter Site Recovery Manager   5.1.1              patch pending\n\n      vFabric Application Director    5.2.0              patch pending \n      vFabric Application Director    5.0.0              patch pending \n      View Client                     5.3.1              patch pending \n      View Client                     4.x                patch pending\n      VIX API                         5.5                patch pending \n      VIX API                         1.12               patch pending \n      \n      vMA (Management Assistant)      5.1.0.1            patch pending     \n  \n\n      VMware Data Recovery            2.0.3              patch pending \n     \n      VMware vSphere CLI              5.5                patch pending \n     \n      vSphere Replication             5.5.1              patch pending \n      vSphere Replication             5.6                patch pending \n      vSphere SDK for Perl            5.5                patch pending \n      vSphere Storage Appliance       5.5.1              patch pending \n      vSphere Storage Appliance       5.1.3              patch pending \n      vSphere Support Assistant       5.5.1              patch pending \n      vSphere Support Assistant       5.5.0              patch pending\n      vSphere Virtual Disk            5.5                patch pending \n      Development Kit                  \n      vSphere Virtual Disk            5.1                patch pending \n      Development Kit\n      vSphere Virtual Disk            5.0                patch pending \n      Development Kit\n \n   4. Solution\n\n   ESXi 5.5\n   ----------------------------\n\n   Download:\n   https://www.vmware.com/patchmgr/download.portal\n\n   Release Notes and Remediation Instructions:\n   http://kb.vmware.com/kb/2077359\n\n   5. Change Log\n\n   2014-06-10 VMSA-2014-0006\n   Initial security advisory in conjunction with the release of\n   ESXi 5.5 updates on 2014-06-10\n\n- -----------------------------------------------------------------------\n \n7. Contact\n\n   E-mail list for product security notifications and announcements:\n   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n   This Security Advisory is posted to the following lists:\n\n    security-announce at lists.vmware.com\n    bugtraq at securityfocus.com\n    fulldisclosure at seclists.org\n\n   E-mail: security at vmware.com\n   PGP key at: http://kb.vmware.com/kb/1055\n\n   VMware Security Advisories\n   http://www.vmware.com/security/advisories\n\n   VMware Security Response Policy\n   https://www.vmware.com/support/policies/security_response.html\n\n   VMware Lifecycle Support Phases\n   https://www.vmware.com/support/policies/lifecycle.html\n \n   Twitter\n   https://twitter.com/VMwareSRC\n\n   Copyright 2014 VMware Inc.  All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04347622\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04347622\nVersion: 1\n\nHPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network\nProducts including H3C and 3COM Routers and Switches running OpenSSL, Remote\nDenial of Service (DoS), Code Execution, Unauthorized Access, Modification or\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-06-20\nLast Updated: 2014-06-20\n\nPotential Security Impact: Remote Denial of Service (DoS), code execution,\nunauthorized access, modification of information, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Intelligent\nManagement Center (iMC), HP Network Products including 3COM and H3C routers\nand switches running OpenSSL. The vulnerabilities could be exploited remotely\nto create a Denial of Service (DoS), execute code, allow unauthorized access,\nmodify or disclose information. \n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information\nCVE-2014-0198 Remote Unauthorized Access (only iMC impacted)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nSSRT101561\nNote: All products listed are impacted by CVE-2014-0224 . iMC is also\nimpacted by CVE-2014-0198 and CVE-2010-5298\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nOn June 5th 2014, OpenSSL.org issued an advisory with several CVE\nvulnerabilities. HP Networking is working to release fixes for these\nvulnerabilities that impact the products in the table below. As fixed\nsoftware is made available, this security bulletin will be updated to show\nthe fixed versions. Until the software fixes are available, HP Networking is\nproviding the following information including possible workarounds to\nmitigate the risks of these vulnerabilities. \n\nWorkarounds\n\nHP Networking equipment is typically deployed inside firewalls and access to\nmanagement interfaces and other protocols is more tightly controlled than in\npublic environments. \n\nFollowing the guidelines in the Hardening Comware-based devices can help to\nfurther reduce man-in-the-middle opportunities:\n\nhttp://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536\n920\n\nFor an HP Networking device acting as an OpenSSL Server, using a patched\nOpenSSL client or non-OpenSSL client eliminates the risk. \n\nProtocol Notes\n\nThe following details the protocols that use OpenSSL in Comware v5 and\nComware v7:\n\nComware V7:\n\nServer:\n\nFIPS/HTTPS/Load Balancing/Session Initiation Protocol\n\nClient:\n\nLoad Balancing/OpenFlow/Session Initiation Protocol/State Machine Based\nAnti-Spoofing/Dynamic DNS\n\nComware V5:\n\nServer:\n\nCAPWAP/EAP/SSLVPN\n\nClient:\n\nDynamic DNS\n\nFamily\n Fixed Version\n HP Branded Products Impacted\n H3C Branded Products Impacted\n 3Com Branded Products Impacted\n\n12900 Switch Series\n Fix in progress\nuse mitigations\n JG619A HP FF 12910 Switch AC Chassis\nJG621A HP FF 12910 Main Processing Unit\nJG632A HP FF 12916 Switch AC Chassis\nJG634A HP FF 12916 Main Processing Unit\n\n12500\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJC808A HP 12500 TAA Main Processing Unit\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n12500 (Comware v7)\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJG497A HP 12500 MPU w/Comware V7 OS\nJG782A HP FF 12508E AC Switch Chassis\nJG783A HP FF 12508E DC Switch Chassis\nJG784A HP FF 12518E AC Switch Chassis\nJG785A HP FF 12518E DC Switch Chassis\nJG802A HP FF 12500E MPU\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n11900 Switch Series\n Fix in progress\nuse mitigations\n JG608A HP FF 11908-V Switch Chassis\nJG609A HP FF 11900 Main Processing Unit\n\n10500 Switch Series (Comware v5)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC614A HP 10500 Main Processing Unit\nJC748A HP 10512 Switch Chassis\nJG375A HP 10500 TAA Main Processing Unit\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\n\n10500 Switch Series (Comware v7)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC748A HP 10512 Switch Chassis\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\nJG496A HP 10500 Type A MPU w/Comware v7 OS\n\n9500E\n Fix in progress\nuse mitigations\n JC124A HP A9508 Switch Chassis\nJC124B HP 9505 Switch Chassis\nJC125A HP A9512 Switch Chassis\nJC125B HP 9512 Switch Chassis\nJC474A HP A9508-V Switch Chassis\nJC474B HP 9508-V Switch Chassis\n H3C S9505E Routing-Switch Chassis (0235A0G6)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9512E Routing-Switch Chassis (0235A0G7)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9505E Chassis w/ Fans (0235A38P)\nH3C S9512E Chassis w/ Fans (0235A38R)\n\nRouter 8800\n Fix in progress\nuse mitigations\n JC147A HP A8802 Router Chassis\nJC147B HP 8802 Router Chassis\nJC148A HP A8805 Router Chassis\nJC148B HP 8805 Router Chassis\nJC149A HP A8808 Router Chassis\nJC149B HP 8808 Router Chassis\nJC150A HP A8812 Router Chassis\nJC150B HP 8812 Router Chassis\nJC141A HP 8802 Main Control Unit Module\nJC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod\nJC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod\n H3C SR8805 10G Core Router Chassis (0235A0G8)\nH3C SR8808 10G Core Router Chassis (0235A0G9)\nH3C SR8812 10G Core Router Chassis (0235A0GA)\nH3C SR8802 10G Core Router Chassis (0235A0GC)\nH3C SR8802 10G Core Router Chassis (0235A31B)\nH3C SR8805 10G Core Router Chassis (0235A31C)\nH3C SR8808 10G Core Router Chassis (0235A31D)\nH3C SR8812 10G Core Router Chassis (0235A31E)\n\n7500 Switch Series\n Fix in progress\nuse mitigations\n JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T\nJC697A HP A7502 TAA Main Processing Unit\nJC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE\nJC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE\nJC700A HP A7500 384 Gbps TAA Fabric / MPU\nJC701A HP A7510 768 Gbps TAA Fabric / MPU\nJD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports\nJD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports\nJD194A HP 384 Gbps Fabric A7500 Module\nJD194B HP 7500 384Gbps Fabric Module\nJD195A HP 7500 384Gbps Advanced Fabric Module\nJD196A HP 7502 Fabric Module\nJD220A HP 7500 768Gbps Fabric Module\nJD238A HP A7510 Switch Chassis\nJD238B HP 7510 Switch Chassis\nJD239A HP A7506 Switch Chassis\nJD239B HP 7506 Switch Chassis\nJD240A HP A7503 Switch Chassis\nJD240B HP 7503 Switch Chassis\nJD241A HP A7506 Vertical Switch Chassis\nJD241B HP 7506-V Switch Chassis\nJD242A HP A7502 Switch Chassis\nJD242B HP 7502 Switch Chassis\nJD243A HP A7503 Switch Chassis w/1 Fabric Slot\nJD243B HP 7503-S Switch Chassis w/1 Fabric Slot\n H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)\nH3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)\nH3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)\nH3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)\nH3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)\nH3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)\nH3C S7502E Chassis w/ fans (0235A29A)\nH3C S7503E Chassis w/ fans (0235A27R)\nH3C S7503E-S Chassis w/ fans (0235A33R)\nH3C S7506E Chassis w/ fans (0235A27Q)\nH3C S7506E-V Chassis w/ fans (0235A27S)\n\nHSR6800\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6800 Russian Version\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6602\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nHSR6602 Russian Version\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nA6600\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\nA6600 Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU\nJG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n5920 Switch Series\n Fix in progress\nuse mitigations\n JG296A HP 5920AF-24XG Switch\nJG555A HP 5920AF-24XG TAA Switch\n\n5900 Switch Series\n Fix in progress\nuse mitigations\n JC772A HP 5900AF-48XG-4QSFP+ Switch\nJG336A HP 5900AF-48XGT-4QSFP+ Switch\nJG510A HP 5900AF-48G-4XG-2QSFP+ Switch\nJG554A HP 5900AF-48XG-4QSFP+ TAA Switch\nJG838A HP FF 5900CP-48XG-4QSFP+ Switch\n\n5900 Virtual Switch\n Fix in progress\nuse mitigations\n JG814AAE HP Virtual Switch 5900v VMware E-LTU\nJG815AAE HP VSO SW for 5900v VMware E-LTU\n\n5830 Switch Series\n Fix in progress\nuse mitigations\n JC691A HP A5830AF-48G Switch w/1 Interface Slot\nJC694A HP A5830AF-96G Switch\nJG316A HP 5830AF-48G TAA Switch w/1 Intf Slot\nJG374A HP 5830AF-96G TAA Switch\n\n5820 Switch Series\n Fix in progress\nuse mitigations\n JC102A HP 5820-24XG-SFP+ Switch\nJC106A HP 5820-14XG-SFP+ Switch with 2 Slots\nJG219A HP 5820AF-24XG Switch\nJG243A HP 5820-24XG-SFP+ TAA-compliant Switch\nJG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots\n H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media\nmodules Plus OSM (0235A37L)\nH3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T\n(RJ45) (0235A370)\n\n5800 Switch Series\n Fix in progress\nuse mitigations\n JC099A HP 5800-24G-PoE Switch\nJC100A HP 5800-24G Switch\nJC101A HP 5800-48G Switch with 2 Slots\nJC103A HP 5800-24G-SFP Switch\nJC104A HP 5800-48G-PoE Switch\nJC105A HP 5800-48G Switch\nJG225A HP 5800AF-48G Switch\nJG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots\nJG254A HP 5800-24G-PoE+ TAA-compliant Switch\nJG255A HP 5800-24G TAA-compliant Switch\nJG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt\nJG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot\nJG258A HP 5800-48G TAA Switch w 1 Intf Slot\n H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot\n(0235A36U)\nH3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X\n(SFP Plus ) Plus 1 media module PoE (0235A36S)\nH3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus\nmedia module (no power) (0235A374)\nH3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus\n) Plus media module (0235A379)\nH3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module\n(0235A378)\nH3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM\n(0235A36W)\n\n5500 HI Switch Series\n Fix in progress\nuse mitigations\n JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch\nJG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch\nJG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt\nJG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt\nJG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt\nJG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt\nJG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt\nJG681A HP 5500-24G-SFP HI TAA Swch w/2Slt\n\n5500 EI Switch Series\n Fix in progress\nuse mitigations\n JD373A HP 5500-24G DC EI Switch\nJD374A HP 5500-24G-SFP EI Switch\nJD375A HP 5500-48G EI Switch\nJD376A HP 5500-48G-PoE EI Switch\nJD377A HP 5500-24G EI Switch\nJD378A HP 5500-24G-PoE EI Switch\nJD379A HP 5500-24G-SFP DC EI Switch\nJG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts\nJG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts\nJG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts\nJG250A HP 5500-24G EI TAA Switch w 2 Intf Slts\nJG251A HP 5500-48G EI TAA Switch w 2 Intf Slts\nJG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts\nJG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts\n H3C S5500-28C-EI Ethernet Switch (0235A253)\nH3C S5500-28F-EI Eth Switch AC Single (0235A24U)\nH3C S5500-52C-EI Ethernet Switch (0235A24X)\nH3C S5500-28C-EI-DC Ethernet Switch (0235A24S)\nH3C S5500-28C-PWR-EI Ethernet Switch (0235A255)\nH3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)\nH3C S5500-52C-PWR-EI Ethernet Switch (0235A251)\n\n5500 SI Switch Series\n Fix in progress\nuse mitigations\n JD369A HP 5500-24G SI Switch\nJD370A HP 5500-48G SI Switch\nJD371A HP 5500-24G-PoE SI Switch\nJD372A HP 5500-48G-PoE SI Switch\nJG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts\nJG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts\n H3C S5500-28C-SI Ethernet Switch (0235A04U)\nH3C S5500-52C-SI Ethernet Switch (0235A04V)\nH3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)\nH3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)\n\n5120 EI Switch Series\n Fix in progress\nuse mitigations\n JE066A HP 5120-24G EI Switch\nJE067A HP 5120-48G EI Switch\nJE068A HP 5120-24G EI Switch with 2 Slots\nJE069A HP 5120-48G EI Switch with 2 Slots\nJE070A HP 5120-24G-PoE EI Switch with 2 Slots\nJE071A HP 5120-48G-PoE EI Switch with 2 Slots\nJG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts\nJG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts\nJG245A HP 5120-24G EI TAA Switch w 2 Intf Slts\nJG246A HP 5120-48G EI TAA Switch w 2 Intf Slts\nJG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts\nJG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts\n H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)\nH3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)\nH3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)\nH3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)\nH3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)\nH3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)\n\n5120 SI switch Series\n Fix in progress\nuse mitigations\n JE072A HP 5120-48G SI Switch\nJE073A HP 5120-16G SI Switch\nJE074A HP 5120-24G SI Switch\nJG091A HP 5120-24G-PoE+ (370W) SI Switch\nJG092A HP 5120-24G-PoE+ (170W) SI Switch\n H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)\nH3C S5120-20P-SI L2\n16GE Plus 4SFP (0235A42B)\nH3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)\nH3C S5120-28P-HPWR-SI (0235A0E5)\nH3C S5120-28P-PWR-SI (0235A0E3)\n\n4800 G Switch Series\n Fix in progress\nuse mitigations\n JD007A HP 4800-24G Switch\nJD008A HP 4800-24G-PoE Switch\nJD009A HP 4800-24G-SFP Switch\nJD010A HP 4800-48G Switch\nJD011A HP 4800-48G-PoE Switch\n\n 3Com Switch 4800G 24-Port (3CRS48G-24-91)\n3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)\n3Com Switch 4800G 48-Port (3CRS48G-48-91)\n3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)\n3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)\n\n4510G Switch Series\n Fix in progress\nuse mitigations\n JF428A HP 4510-48G Switch\nJF847A HP 4510-24G Switch\n\n 3Com Switch 4510G 48 Port (3CRS45G-48-91)\n3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)\n3Com Switch E4510-24G (3CRS45G-24-91)\n\n4210G Switch Series\n Fix in progress\nuse mitigations\n JF844A HP 4210-24G Switch\nJF845A HP 4210-48G Switch\nJF846A HP 4210-24G-PoE Switch\n\n 3Com Switch 4210-24G (3CRS42G-24-91)\n3Com Switch 4210-48G (3CRS42G-48-91)\n3Com Switch E4210-24G-PoE (3CRS42G-24P-91)\n\n3610 Switch Series\n Fix in progress\nuse mitigations\n JD335A HP 3610-48 Switch\nJD336A HP 3610-24-4G-SFP Switch\nJD337A HP 3610-24-2G-2G-SFP Switch\nJD338A HP 3610-24-SFP Switch\n H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)\nH3C S3610-28P - model LS-3610-28P-OVS (0235A22D)\nH3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)\nH3C S3610-28F - model LS-3610-28F-OVS (0235A22F)\n\n3600 V2 Switch Series\n Fix in progress\nuse mitigations\n JG299A HP 3600-24 v2 EI Switch\nJG300A HP 3600-48 v2 EI Switch\nJG301A HP 3600-24-PoE+ v2 EI Switch\nJG301B HP 3600-24-PoE+ v2 EI Switch\nJG302A HP 3600-48-PoE+ v2 EI Switch\nJG302B HP 3600-48-PoE+ v2 EI Switch\nJG303A HP 3600-24-SFP v2 EI Switch\nJG304A HP 3600-24 v2 SI Switch\nJG305A HP 3600-48 v2 SI Switch\nJG306A HP 3600-24-PoE+ v2 SI Switch\nJG306B HP 3600-24-PoE+ v2 SI Switch\nJG307A HP 3600-48-PoE+ v2 SI Switch\nJG307B HP 3600-48-PoE+ v2 SI Switch\n\n3100V2\n Fix in progress\nuse mitigations\n JD313B HP 3100-24-PoE v2 EI Switch\nJD318B HP 3100-8 v2 EI Switch\nJD319B HP 3100-16 v2 EI Switch\nJD320B HP 3100-24 v2 EI Switch\nJG221A HP 3100-8 v2 SI Switch\nJG222A HP 3100-16 v2 SI Switch\nJG223A HP 3100-24 v2 SI Switch\n\n3100V2-48\n Fix in progress\nuse mitigations\n JG315A HP 3100-48 v2 Switch\n\n1910\n Fix in progress\nuse mitigations\n JE005A HP 1910-16G Switch\nJE006A HP 1910-24G Switch\nJE007A HP 1910-24G-PoE (365W) Switch\nJE008A HP 1910-24G-PoE(170W) Switch\nJE009A HP 1910-48G Switch\nJG348A HP 1910-8G Switch\nJG349A HP 1910-8G-PoE+ (65W) Switch\nJG350A HP 1910-8G-PoE+ (180W) Switch\n 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293)\n3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093)\n3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893)\n3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93)\n3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)\n\n1810v1 P2\n Fix in progress\nuse mitigations\n J9449A HP 1810-8G Switch\nJ9450A HP 1810-24G Switch\n\n1810v1 PK\n Fix in progress\nuse mitigations\n J9660A HP 1810-48G Switch\n\nMSR20\n Fix in progress\nuse mitigations\n JD432A HP A-MSR20-21 Multi-Service Router\nJD662A HP MSR20-20 Multi-Service Router\nJD663A HP MSR20-21 Multi-Service Router\nJD663B HP MSR20-21 Router\nJD664A HP MSR20-40 Multi-Service Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\nH3C MSR 20-20 (0235A19H)\nH3C MSR 20-21 (0235A325)\nH3C MSR 20-40 (0235A19K)\nH3C MSR-20-21 Router (0235A19J)\n\nMSR20-1X\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJD667A HP MSR20-15 IW Multi-Service Router\nJD668A HP MSR20-13 Multi-Service Router\nJD669A HP MSR20-13 W Multi-Service Router\nJD670A HP MSR20-15 A Multi-Service Router\nJD671A HP MSR20-15 AW Multi-Service Router\nJD672A HP MSR20-15 I Multi-Service Router\nJD673A HP MSR20-11 Multi-Service Router\nJD674A HP MSR20-12 Multi-Service Router\nJD675A HP MSR20-12 W Multi-Service Router\nJD676A HP MSR20-12 T1 Multi-Service Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\nJG209A HP MSR20-12-T-W Router (NA)\nJG210A HP MSR20-13-W Router (NA)\n H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\nH3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-11 (0235A31V)\nH3C MSR 20-12 (0235A32E)\nH3C MSR 20-12 T1 (0235A32B)\nH3C MSR 20-13 (0235A31W)\nH3C MSR 20-13 W (0235A31X)\nH3C MSR 20-15 A (0235A31Q)\nH3C MSR 20-15 A W (0235A31R)\nH3C MSR 20-15 I (0235A31N)\nH3C MSR 20-15 IW (0235A31P)\nH3C MSR20-12 W (0235A32G)\n\nMSR30\n Fix in progress\nuse mitigations\n JD654A HP MSR30-60 POE Multi-Service Router\nJD657A HP MSR30-40 Multi-Service Router\nJD658A HP MSR30-60 Multi-Service Router\nJD660A HP MSR30-20 POE Multi-Service Router\nJD661A HP MSR30-40 POE Multi-Service Router\nJD666A HP MSR30-20 Multi-Service Router\nJF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF232A HP RT-MSR3040-AC-OVS-AS-H3\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)\nH3C MSR 30-20 (0235A19L)\nH3C MSR 30-20 POE (0235A239)\nH3C MSR 30-40 (0235A20J)\nH3C MSR 30-40 POE (0235A25R)\nH3C MSR 30-60 (0235A20K)\nH3C MSR 30-60 POE (0235A25S)\nH3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)\n\nMSR30-16\n Fix in progress\nuse mitigations\n JD659A HP MSR30-16 POE Multi-Service Router\nJD665A HP MSR30-16 Multi-Service Router\nJF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\nH3C MSR 30-16 (0235A237)\nH3C MSR 30-16 POE (0235A238)\n\nMSR30-1X\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\nH3C RT-MSR3011-AC-OVS-H3 (0235A29L)\n\nMSR50\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\n\nMSR50-G2\n Fix in progress\nuse mitigations\n JD429A HP MSR50 G2 Processor Module\nJD429B HP MSR50 G2 Processor Module\n H3C H3C MSR 50 Processor Module-G2 (0231A84Q)\nH3C MSR 50 High Performance Main Processing Unit 3GE (Combo)\n256F/1GD(0231A0KL)\n\nMSR20 Russian version\n Fix in progress\nuse mitigations\n JD663B HP MSR20-21 Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\n\nMSR20-1X Russian version\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\n H3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\n\nMSR30 Russian version\n Fix in progress\nuse mitigations\n JF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\n\nMSR30-1X Russian version\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C RT-MSR3011-AC-OVS-H3 (0235A29L)\nH3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\n\nMSR30-16 Russian version\n Fix in progress\nuse mitigations\n JF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\n\nMSR50 Russian version\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR 50 Processor Module (0231A791)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\n\nMSR50 G2 Russian version\n Fix in progress\nuse mitigations\n JD429B HP MSR50 G2 Processor Module\n H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD\n(0231A0KL)\n\nMSR9XX\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\nJG207A HP MSR900-W Router (NA)\nJG208A HP MSR920-W Router (NA)\n H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b\n(0235A0C2)\nH3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\n\nMSR9XX Russian version\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\n H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\nH3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\n\nMSR93X\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR93X Russian version\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR1000\n Fix in progress\nuse mitigations\n JG732A HP MSR1003-8 AC Router\n\nMSR2000\n Fix in progress\nuse mitigations\n JG411A HP MSR2003 AC Router\n\nMSR3000\n Fix in progress\nuse mitigations\n JG404A HP MSR3064 Router\nJG405A HP MSR3044 Router\nJG406A HP MSR3024 AC Router\nJG409A HP MSR3012 AC Router\nJG861A HP MSR3024 TAA-compliant AC Router\n\nMSR4000\n Fix in progress\nuse mitigations\n JG402A HP MSR4080 Router Chassis\nJG403A HP MSR4060 Router Chassis\nJG412A HP MSR4000 MPU-100 Main Processing Unit\n\nF5000\n Fix in progress\nuse mitigations\n JG216A HP F5000 Firewall Standalone Chassis\nJD259A HP A5000-A5 VPN Firewall Chassis\n H3C SecPath F5000-A5 Host System (0150A0AG)\n\nU200S and CS\n Fix in progress\nuse mitigations\n JD268A HP 200-CS UTM Appliance\nJD273A HP U200-S UTM Appliance\n H3C SecPath U200-S (0235A36N)\n\nU200A and M\n Fix in progress\nuse mitigations\n JD274A HP 200-M UTM Appliance\nJD275A HP U200-A UTM Appliance\n H3C SecPath U200-A (0235A36Q)\n\nF1000A and S\n Fix in progress\nuse mitigations\n JD270A HP S1000-S VPN Firewall Appliance\nJD271A HP S1000-A VPN Firewall Appliance\nJG213A HP F1000-S-EI VPN Firewall Appliance\nJG214A HP F1000-A-EI VPN Firewall Appliance\n\nSecBlade FW\n Fix in progress\nuse mitigations\n JC635A HP 12500 VPN Firewall Module\nJD245A HP 9500 VPN Firewall Module\nJD249A HP 10500/7500 Advanced VPN Firewall Mod\nJD250A HP 6600 Firewall Processing Rtr Module\nJD251A HP 8800 Firewall Processing Module\nJD255A HP 5820 VPN Firewall Module\n H3C S9500E SecBlade VPN Firewall Module (0231A0AV)\nH3C S7500E SecBlade VPN Firewall Module (0231A832)\nH3C SR66 Gigabit Firewall Module (0231A88A)\nH3C SR88 Firewall Processing Module (0231A88L)\nH3C S5820 SecBlade VPN Firewall Module (0231A94J)\n\nF1000E\n Fix in progress\nuse mitigations\n JD272A HP S1000-E VPN Firewall Appliance\n\nVSR1000\n Fix in progress\nuse mitigations\n JG810AAE HP VSR1001 Virtual Services Router\nJG811AAE HP VSR1001 Virtual Services Router\nJG812AAE HP VSR1004 Virtual Services Router\nJG813AAE HP VSR1008 Virtual Services Router\n\nWX5002/5004\n Fix in progress\nuse mitigations\n JD441A HP 5800 ACM for 64-256 APs\nJD447B HP WX5002 Access Controller\nJD448A HP A-WX5004 Access Controller\nJD448B HP WX5004 Access Controller\nJD469A HP A-WX5004 (3Com) Access Controller\nJG261A HP 5800 Access Controller OAA TAA Mod\n\nHP 850/870\n Fix in progress\nuse mitigations\n JG723A HP 870 Unified Wired-WLAN Appliance\nJG725A HP 870 Unifd Wrd-WLAN TAA Applnc\n\nHP 830\n Fix in progress\nuse mitigations\n JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch\nJG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch\nJG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch\nJG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch\n\nHP 6000\n Fix in progress\nuse mitigations\n JG639A HP 10500/7500 20G Unified Wired-WLAN Mod\nJG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod\n\nM220\n Fix in progress\nuse mitigations\n J9798A HP M220 802.11n AM Access Point\nJ9799A HP M220 802.11n WW Access Point\n\nNGFW\n Fix in progress\nuse mitigations\n JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic\nJC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic\nJC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic\nJC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic\nJC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic\n\niMC UAM 7.0\n Fix in progress\nuse mitigations\n JD144A HP IMC UAM S/W Module w/200-User License\nJF388A HP IMC UAM S/W Module w/200-user License\nJD435A HP IMC EAD Client Software\nJF388AAE HP IMC UAM S/W Module w/200-user E-LTU\nJG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU\n\niMC EAD 7.0\n Fix in progress\nuse mitigations\n JF391AAE HP IMC EAD S/W Module w/200-user E-LTU\nJG754AAE HP IMC EAD SW Module w/ 50-user E-LTU\nJD147A HP IMC Endpoint Admission Defense Software Module with 200-user\nLicense\nJF391A HP IMC EAD S/W Module w/200-user License\n\niMC PLAT 7.0\n Fix in progress\nuse mitigations\n JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU\nJG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU\nJG747AAE HP IMC Standard Software Platform with 50-node E-LTU\nJG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU\nJD125A HP IMC Standard Edition Software Platform with 100-node License\nJD815A HP IMC Standard Edition Software Platform with 100-node License\nJD816A HP A-IMC Standard Edition Software DVD Media\nJF377A HP IMC Standard Edition Software Platform with 100-node License\nJF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU\nJF289AAE HP Enterprise Management System to Intelligent Management Center\nUpgrade E-LTU\nTJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL\nnot HPNs)\nJF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU\nJG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU\nJD126A HP A-IMC Enterprise Software Platform with 200-node License\nJD808A HP A-IMC Enterprise Software Platform with 200-node License\nJD814A HP A-IMC Enterprise Edition Software DVD Media\nJF378A HP IMC Enterprise Edition Software Platform with 200-node License\nJG546AAE HP IMC Basic SW Platform w/50-node E-LTU\nJG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\nJG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU\nJG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU\nJG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition\nE-LTU\nJG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance\nSoftware E-LTU\n\nHISTORY\nVersion:1 (rev.1) - 20 June 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. 7) - x86_64\n\n3. \nCorrected:      2014-05-13 23:19:16 UTC (stable/10, 10.0-STABLE)\n                2014-05-13 23:22:28 UTC (releng/10.0, 10.0-RELEASE-p3)\nCVE Name:       CVE-2014-0198\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nThe TLS protocol supports an alert protocol which can be used to signal the\nother party with certain failures in the protocol context that may require\nimmediate termination of the connection. \n\nII.  Problem Description\n\nAn attacker can trigger generation of an SSL alert which could cause a null\npointer deference. \n\nIII. \n\nIV. \n\nThe FreeBSD base system service daemons and utilities do not use the\nSSL_MODE_RELEASE_BUFFERS mode.  However, many third party software uses this\nmode to reduce their memory footprint and may therefore be affected by this\nissue. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n# fetch http://security.FreeBSD.org/patches/SA-14:10/openssl.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:10/openssl.patch.asc\n# gpg --verify openssl.patch.asc\n\nb) Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nRecompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/10/                                                        r265986\nreleng/10.0/                                                      r265987\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
         {
            db: "BID",
            id: "67193",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "PACKETSTORM",
            id: "126650",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0198",
            trust: 2.3,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "67193",
            trust: 1.4,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59284",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59990",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60049",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60066",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59491",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58667",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61254",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59449",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59374",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59264",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59438",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59310",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59306",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59529",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59784",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59398",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59202",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59190",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59440",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58945",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59282",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59163",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59126",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58714",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59525",
            trust: 1.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-234763",
            trust: 1.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03G",
            trust: 0.4,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "JUNIPER",
            id: "JSA10643",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03F",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03B",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03C",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03",
            trust: 0.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-14-198-03D",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-0198",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127608",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127630",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126927",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140720",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127045",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127190",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127042",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126650",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            db: "BID",
            id: "67193",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "PACKETSTORM",
            id: "126650",
         },
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   id: "VAR-201405-0244",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.42320128826086956,
   },
   last_update_date: "2024-11-28T20:48:14.708000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/07/10/fireeye_patches_os_torpedo_exploitdb_disclosure/",
         },
         {
            title: "Debian Security Advisories: DSA-2931-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=828d990b615b0dfea284a3530e6fe590",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2192-1",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0198 Null pointer dereference bug in OpenSSL 1.0.1g and earlier",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=94b6140bb563b66b3bcd98992e854bf3",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=b92b65104373bc8476811ff1b99cd369",
         },
         {
            title: "Red Hat: CVE-2014-0198",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0198",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSH",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b7f5b1e7edcafce07f28205855d4db49",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-476",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 1.4,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 1.4,
            url: "http://www.fortiguard.com/advisory/fg-ir-14-018/",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 1.4,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529",
         },
         {
            trust: 1.4,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html",
         },
         {
            trust: 1.4,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 1.4,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29195",
         },
         {
            trust: 1.4,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.4,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
         },
         {
            trust: 1.2,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1093837",
         },
         {
            trust: 1.1,
            url: "http://www.openbsd.org/errata55.html#005_openssl",
         },
         {
            trust: 1.1,
            url: "https://rt.openssl.org/ticket/display.html?user=guest&pass=guest&id=3321",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-2931",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html",
         },
         {
            trust: 1.1,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 1.1,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59438",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59491",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59126",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60049",
         },
         {
            trust: 1.1,
            url: "http://puppetlabs.com/security/cve/cve-2014-0198",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60066",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59990",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59784",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 1.1,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1.1,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 1.1,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/67193",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:080",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 1.1,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61254",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59529",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59525",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59449",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59440",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59398",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59374",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59310",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59306",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59284",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59282",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59264",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59202",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59190",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59163",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58945",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58714",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58667",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://advisories.mageia.org/mgasa-2014-0204.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03g",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0198_buffer_errors",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=kb29217",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list&showdraft=false",
         },
         {
            trust: 0.3,
            url: "http://www.cerberusftp.com/products/releasenotes.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10643&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://anoncvs.estpak.ee/cgi-bin/cgit/openbsd-src/commit/lib/libssl?id=e76e308f1fab2253ab5b4ef52a1865c5ffecdf21",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/may/67",
         },
         {
            trust: 0.3,
            url: "http://ftp.openbsd.org/pub/openbsd/patches/5.5/common/005_openssl.patch.sig",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100180978",
         },
         {
            trust: 0.3,
            url: "http://ics-cert.us-cert.gov/advisories/icsa-14-198-03",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03d",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368264",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347622",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004830",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21690128",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03b",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03c",
         },
         {
            trust: 0.3,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03f",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.2,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/solutions/905793",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0224.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0198.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2010-5298.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3470.html",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0195.html",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/476.html",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/./dsa-2931",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2192-1/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=34106",
         },
         {
            trust: 0.1,
            url: "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://www.hpe.com/info/report-security-vulnerability",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://twitter.com/vmwaresrc",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/security/advisories",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1055",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/2077359",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/lifecycle.html",
         },
         {
            trust: 0.1,
            url: "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/support/policies/security_response.html",
         },
         {
            trust: 0.1,
            url: "https://www.vmware.com/patchmgr/download.portal",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=c03536",
         },
         {
            trust: 0.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0679.html",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:10/openssl.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198>",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?user=guest&pass=guest&id=3321>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://ftp.openbsd.org/pub/openbsd/patches/5.5/common/005_openssl.patch.sig>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:10/openssl.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:10.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            db: "BID",
            id: "67193",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "PACKETSTORM",
            id: "126650",
         },
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            db: "BID",
            id: "67193",
         },
         {
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            db: "PACKETSTORM",
            id: "126650",
         },
         {
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-05-06T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            date: "2014-05-02T00:00:00",
            db: "BID",
            id: "67193",
         },
         {
            date: "2014-07-24T23:48:05",
            db: "PACKETSTORM",
            id: "127608",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2014-07-28T20:36:25",
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            date: "2014-06-05T15:17:27",
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            date: "2017-01-25T21:54:44",
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            date: "2014-06-11T23:18:46",
            db: "PACKETSTORM",
            id: "127045",
         },
         {
            date: "2014-06-24T01:45:14",
            db: "PACKETSTORM",
            id: "127190",
         },
         {
            date: "2014-06-11T00:10:53",
            db: "PACKETSTORM",
            id: "127042",
         },
         {
            date: "2014-05-15T23:33:33",
            db: "PACKETSTORM",
            id: "126650",
         },
         {
            date: "2014-05-06T10:44:05.470000",
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0198",
         },
         {
            date: "2017-05-23T16:24:00",
            db: "BID",
            id: "67193",
         },
         {
            date: "2024-11-21T02:01:37.150000",
            db: "NVD",
            id: "CVE-2014-0198",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "67193",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL 'so_ssl3_write()' Function NULL Pointer Dereference Denial of Service Vulnerability",
      sources: [
         {
            db: "BID",
            id: "67193",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "67193",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0128
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0128",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60982",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-0463",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-0463",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-60465",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0463",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0463",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-049",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60465",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2013-0463",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "BID",
            id: "60982",
         },
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0463",
            trust: 2.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "81017",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60982",
            trust: 0.5,
         },
         {
            db: "VULHUB",
            id: "VHN-60465",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            db: "BID",
            id: "60982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   id: "VAR-201307-0128",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:48:14.259000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.2,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81017",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0463",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0463",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81017",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.securityfocus.com/bid/60982",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            db: "BID",
            id: "60982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            db: "BID",
            id: "60982",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60982",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            date: "2013-07-03T13:54:30.957000",
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60465",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0463",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60982",
         },
         {
            date: "2013-10-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
         {
            date: "2017-08-29T01:33:02.197000",
            db: "NVD",
            id: "CVE-2013-0463",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003194",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-049",
         },
      ],
      trust: 0.6,
   },
}

var-201304-0010
Vulnerability from variot

Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors. An attacker can exploit this issue to execute arbitrary shell commands (Unix or Windows command or scripts) within the context of the application. The software supports secure integration of complex B2B processes with diverse partner communities. The vulnerability stems from an unspecified bug in the CLA2 server

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0010",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "gentran integration suite",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "1.1 to  2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.41",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "59025",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:gentran_integration_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_integrator",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "59025",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2012-5937",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2012-5937",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  id: "VHN-59218",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2012-5937",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2012-5937",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201304-194",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-59218",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unspecified vulnerability in the CLA2 server in IBM Gentran Integration Suite 4.3, Sterling Integrator 5.0 and 5.1, and Sterling B2B Integrator 5.2, as used in IBM Sterling File Gateway 1.1 through 2.2 and other products, allows remote attackers to execute arbitrary commands via unknown vectors. \nAn attacker can exploit this issue to execute arbitrary shell commands  (Unix or Windows command or scripts) within the context of the  application. The software supports secure integration of complex B2B processes with diverse partner communities. The vulnerability stems from an unspecified bug in the CLA2 server",
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "BID",
            id: "59025",
         },
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2012-5937",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "80403",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC85189",
            trust: 0.6,
         },
         {
            db: "SECUNIA",
            id: "53007",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "59025",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-59218",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            db: "BID",
            id: "59025",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   id: "VAR-201304-0010",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T21:22:26.891000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1633925",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21633925",
         },
         {
            title: "IC85189",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC85189",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21633925",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic85189",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/80403",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5937",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5937",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/80403",
         },
         {
            trust: 0.6,
            url: "http://secunia.com/advisories/53007",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24034725",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            db: "BID",
            id: "59025",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            db: "BID",
            id: "59025",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-04-12T00:00:00",
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            date: "2013-04-10T00:00:00",
            db: "BID",
            id: "59025",
         },
         {
            date: "2013-04-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            date: "2013-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            date: "2013-04-12T19:55:01.857000",
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-59218",
         },
         {
            date: "2013-04-10T00:00:00",
            db: "BID",
            id: "59025",
         },
         {
            date: "2013-04-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
         {
            date: "2013-04-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
         {
            date: "2024-11-21T01:45:33.297000",
            db: "NVD",
            id: "CVE-2012-5937",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201304-194",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  IBM Vulnerability to execute arbitrary commands in the product",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-002234",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Input Validation Error",
      sources: [
         {
            db: "BID",
            id: "59025",
         },
      ],
      trust: 0.3,
   },
}

var-201408-0092
Vulnerability from variot

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zb, 1.0.0n, and 1.0.1i are vulnerable. OpenSSL Security Advisory [6 Aug 2014] ========================================

Information leak in pretty printing functions (CVE-2014-3508)

A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.

Thanks to Ivan Fratric (Google) for discovering this issue. This issue was reported to OpenSSL on 19th June 2014.

The fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL development team. This can be exploited through a Denial of Service attack.

OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and researching this issue. This issue was reported to OpenSSL on 2nd July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

OpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this issue. This issue was reported to OpenSSL on 8th July 2014.

The fix was developed by Gabor Tyukasz.

Double Free when processing DTLS packets (CVE-2014-3505)

An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley and Wan-Teh Chang (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley. This can be exploited through a Denial of Service attack.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley.

OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)

OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack.

OpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i.

Thanks to Felix Gröbert (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 18th July 2014.

The fix was developed by Emilia Käsper of the OpenSSL development team.

OpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i.

Thanks to David Benjamin and Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 21st July 2014.

The fix was developed by David Benjamin.

SRP buffer overrun (CVE-2014-3512)

A malicious client or server can send invalid SRP parameters and overrun an internal buffer. Only applications which are explicitly set up for SRP use are affected.

Thanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC Group) for discovering this issue. This issue was reported to OpenSSL on 31st July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20140806.txt

Note: the online version of the advisory may be updated with additional details over time. Corrected: 2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE) 2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8) 2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE) 2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1) 2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11) 2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18) 2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE) 2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15) CVE Name: CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510, CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-5139]

III. Additionally, a remote attacker may be able to run arbitrary code on a vulnerable system if the application has been set up for SRP.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc

gpg --verify openssl-10.0.patch.asc

[FreeBSD 9.3]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc

gpg --verify openssl-9.3.patch.asc

[FreeBSD 9.2, 9.1, 8.4]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc

gpg --verify openssl-9.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r269687 releng/8.4/ r271305 stable/9/ r269687 releng/9.1/ r271305 releng/9.2/ r271305 releng/9.3/ r271305 stable/10/ r269686 releng/10.0/ r271304


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII.

Release Date: 2014-08-14 Last Updated: 2014-08-14

Potential Security Impact: Remote Denial of Service (DoS), unauthorized access.

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), allow unauthorized access. HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before 0.9.8zb

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-3505 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-3506 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-3507 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3510 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to resolve these vulnerabilities. The updates are available from https://h20392.www2.hp.com/portal/swdepot/displayP roductInfo.do?productNumber=OPENSSL11I

HP-UX Release HP-UX OpenSSL version

B.11.11 (11i v1) OpenSSL_A.00.09.08zb.001_HP-UX_B.11.11_32_64.depot

B.11.23 (11i v2) OpenSSL_A.00.09.08zb.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) OpenSSL_A.00.09.08zb.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install OpenSSL A.00.09.08zb or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zb.001 or subsequent

HP-UX B.11.23

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zb.002 or subsequent

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zb.003 or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 15 August 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security update Advisory ID: RHSA-2014:1052-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1052.html Issue date: 2014-08-13 CVE Names: CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.

A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code. (CVE-2014-3509)

It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508)

A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions. (CVE-2014-3511)

Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3510)

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions 1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext 1127499 - CVE-2014-3505 openssl: DTLS packet processing double free 1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion 1127502 - CVE-2014-3507 openssl: DTLS memory leak from zero-length fragments 1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service 1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.15.ppc.rpm openssl-1.0.1e-16.el6_5.15.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.15.ppc.rpm openssl-devel-1.0.1e-16.el6_5.15.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.15.s390.rpm openssl-1.0.1e-16.el6_5.15.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm openssl-devel-1.0.1e-16.el6_5.15.s390.rpm openssl-devel-1.0.1e-16.el6_5.15.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.15.ppc64.rpm openssl-static-1.0.1e-16.el6_5.15.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm openssl-perl-1.0.1e-16.el6_5.15.s390x.rpm openssl-static-1.0.1e-16.el6_5.15.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

ppc64: openssl-1.0.1e-34.el7_0.4.ppc64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm openssl-devel-1.0.1e-34.el7_0.4.ppc.rpm openssl-devel-1.0.1e-34.el7_0.4.ppc64.rpm openssl-libs-1.0.1e-34.el7_0.4.ppc.rpm openssl-libs-1.0.1e-34.el7_0.4.ppc64.rpm

s390x: openssl-1.0.1e-34.el7_0.4.s390x.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm openssl-devel-1.0.1e-34.el7_0.4.s390.rpm openssl-devel-1.0.1e-34.el7_0.4.s390x.rpm openssl-libs-1.0.1e-34.el7_0.4.s390.rpm openssl-libs-1.0.1e-34.el7_0.4.s390x.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm openssl-perl-1.0.1e-34.el7_0.4.ppc64.rpm openssl-static-1.0.1e-34.el7_0.4.ppc.rpm openssl-static-1.0.1e-34.el7_0.4.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm openssl-perl-1.0.1e-34.el7_0.4.s390x.rpm openssl-static-1.0.1e-34.el7_0.4.s390.rpm openssl-static-1.0.1e-34.el7_0.4.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2014-3505.html https://www.redhat.com/security/data/cve/CVE-2014-3506.html https://www.redhat.com/security/data/cve/CVE-2014-3507.html https://www.redhat.com/security/data/cve/CVE-2014-3508.html https://www.redhat.com/security/data/cve/CVE-2014-3509.html https://www.redhat.com/security/data/cve/CVE-2014-3510.html https://www.redhat.com/security/data/cve/CVE-2014-3511.html https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20140806.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFT69raXlSAg2UNWIIRAiQAAKCbp6Iou4mHuootBfgs0jm7zP/wWACgt50C pHXxupQnHYYH+zJFOmk5u8o= =DwUW -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-2308-1 August 07, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenSSL. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. When OpenSSL is used with certain applications, an attacker may use this issue to possibly gain access to sensitive information. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5139)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.5

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.17

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.20

After a standard system update you need to reboot your computer to make all the necessary changes. 5 client) - i386, x86_64

  1. (CVE-2014-3510)

Red Hat would like to thank the OpenSSL project for reporting CVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue. Description:

Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. Solution:

The References section of this erratum contains a download link (you must log in to download the update).

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz: Upgraded. ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 30bdc015b10d8891b90d3f6ea34f5fdd openssl-0.9.8zb-i486-1_slack13.0.txz 3dc4140c22c04c94e5e74386a5a1c200 openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 3da32f51273762d67bf9dbcc91af9413 openssl-0.9.8zb-x86_64-1_slack13.0.txz 075e5d12e5b909ecac923cb210f83544 openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 3b7e2bb2b317bf72b8f9b2b7a14bddfb openssl-0.9.8zb-i486-1_slack13.1.txz 92af0784eade0674332a56bfab73b97d openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: df5f961109d7b50971660ca6a7d4c48c openssl-0.9.8zb-x86_64-1_slack13.1.txz 582aaeae3d56730a2e1538a67d4e44da openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 546445d56d3b367fa0dd4e80859c4620 openssl-0.9.8zb-i486-1_slack13.37.txz b80e9df8cdd0649939ec2fab20d24691 openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 9c9ce97dc21340924a3e27c1a8047023 openssl-0.9.8zb-x86_64-1_slack13.37.txz 0fe1931f2fc82fb8d5fbe72680caf843 openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Slackware 14.0 packages: d1580f4b22b99cee42b22276653c8180 openssl-1.0.1i-i486-1_slack14.0.txz ec93cec2bcab8ae7391a504573cbc231 openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 329475de3759225b1d02aa7317b2eb58 openssl-1.0.1i-x86_64-1_slack14.0.txz 25f2a198022d974534986a3913ca705c openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 8336457bc31d44ebf502ffc4443f12f7 openssl-1.0.1i-i486-1_slack14.1.txz 4b99ac357fbd3065c53367eea246b8c7 openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: f2b8f81d9d7dc02e5d1011f663ccc95d openssl-1.0.1i-x86_64-1_slack14.1.txz 4360abffbb57cb18ba0720f782d78250 openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Slackware -current packages: 49ecd332a899cf742d3467a6efe44269 a/openssl-solibs-1.0.1i-i486-1.txz 27da017c49045981b1793f105aff365f n/openssl-1.0.1i-i486-1.txz

Slackware x86_64 -current packages: 8d74f3d770802182137c84d925f58cbc a/openssl-solibs-1.0.1i-x86_64-1.txz fd9d94d3210f0aedf74959cb0887e2b8 n/openssl-1.0.1i-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201408-0092",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8w",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8u",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "0.9.8m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8y",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8r",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8s",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8t",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8i",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.8 thats all  0.9.8zb",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0 thats all  1.0.0n",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1 thats all  1.0.1i",
         },
         {
            model: "hp virtual connect",
            scope: "lt",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "8gb 24 port fiber channel module  3.00   (vc ( virtual connect ) 4.40  )",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.6,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "8.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip wom hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "-release-p2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "big-ip apm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "big-ip webaccelerator hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "8.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.2-release-p11",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.0",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7110",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "vios fp-25 sp-02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.4",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.3-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7530061.121.225.06100",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.2",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "7.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip asm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "7.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge gateway hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79120",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "jboss web server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2.1.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2407863",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "big-ip psm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79180",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35007383",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78450",
         },
         {
            model: "release-p4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7101",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "72250",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "9.1-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2207906",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "megaraid storage manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "15.03.01.00",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "hp-ux b.11.23 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v2)",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53002.0",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip webaccelerator hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x7101",
         },
         {
            model: "-release/alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "8.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.1",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "9.2-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78350",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "9.1--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79130",
         },
         {
            model: "6.3-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "9.3-beta3-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "72200",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57350",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.4",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7556061.121.225.06100",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "9.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.40",
         },
         {
            model: "-stablepre2001-07-20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip ltm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5855072.060.134.32804",
         },
         {
            model: "8.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "6.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x33007382",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "7.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.1",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x7110",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "7.0-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "9.0-rc3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "jboss enterprise application platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.3",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78300",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x638370",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "big-ip ltm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "7.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "7.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75300",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "9.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7955",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "nextscale nx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "54550",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "7.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2x",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "7.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.0-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "big-ip analytics hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408738",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5875072.060.134.32804",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "8.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75450",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0.x",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.3-rc",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "9.3-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "8.4-release-p13",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "enterprise linux desktop client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9301072.180.134.32804",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7",
         },
         {
            model: "big-ip edge gateway hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "-pre-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura communication manager utility services sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.16.1.0.9.8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x365079150",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75560",
         },
         {
            model: "8.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "enterprise linux load balancer eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip ltm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "9.3-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58750",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35507914",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "8.3-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x6500",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip asm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "9.1-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.3",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "7.3-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.2-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3x",
         },
         {
            model: "9.3-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4.0.15",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "8.3-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "-stablepre2002-03-07",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "big-ip apm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip psm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip wom hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0.11",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087330",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.2",
         },
         {
            model: "8.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "7.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "8.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.0",
         },
         {
            model: "7.3-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "6.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "89000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "7.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "big-ip edge gateway hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "8.3-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2202585",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "10.0-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip webaccelerator hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "9.1-release-p17",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75250",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.3",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "big-ip wom hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7525061.121.225.06100",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-release-p1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge gateway hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7835072.010.134.32804",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.5.0.15",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "8-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip psm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2227916",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "-release-p6",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip webaccelerator hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "8.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "8.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "7.1-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "8.4-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2-",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip wom hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "9.1-release-p18",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip analytics 11.0.0-hf2",
            scope: null,
            trust: 0.3,
            vendor: "f5",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.20",
         },
         {
            model: "7.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1i",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4x",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0.x",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "7.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "big-ip analytics hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "10.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "hp-ux b.11.11 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v1)",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.4",
         },
         {
            model: "6.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8804259",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge gateway hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.1-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-493",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "7.0-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x37508752",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "8700072.161.134.32804",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "8.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "big-ip psm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip ltm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "8.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "6.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5x",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "7.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36307158",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5745061.132.224.35203",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7830072.010.134.32804",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "big-ip asm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "10.0-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93020",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "puredata system for operational analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "8.1-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "bladecenter advanced management module 3.66g",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "big-ip ltm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6500",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58550",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "big-ip apm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "8900072.161.134.32804",
         },
         {
            model: "9.3-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1x",
         },
         {
            model: "9.3-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408737",
         },
         {
            model: "9.0--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "7.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0.x",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9302072.180.134.32804",
         },
         {
            model: "9.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "3655072.060.134.32804",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "big-ip wom hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "release -p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2-",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.1-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57550",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "9.3-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tivoli netcool system service monitor fp14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2x",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "7.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.0",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "8-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "big-ip webaccelerator hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "7.3-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "8.2-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x32502583",
         },
         {
            model: "9.2-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93030",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5755061.132.224.35203",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "big-ip edge clients for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.5",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "8.4-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7080",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7225072.030.134.32804",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x31002582",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "6.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip psm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge clients for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.4",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "58450",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5845072.060.134.32804",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1x",
         },
         {
            model: "9.3-release-p1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1.0",
         },
         {
            model: "8.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.16",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5740061.132.224.35203",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57450",
         },
         {
            model: "8.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "big-ip psm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "big-ip asm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "87000",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x310054570",
         },
         {
            model: "big-ip webaccelerator hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "9.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35307160",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "7.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7110",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6500",
         },
         {
            model: "7.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8400",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "36550",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "release p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3--",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "big-ip analytics hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7535061.121.225.06100",
         },
         {
            model: "5.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p10",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "big-ip asm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087180",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "66550",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.3-beta1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip analytics hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "cms r17ac.g",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "78550",
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79190",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.2",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x638370",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.0",
         },
         {
            model: "big-ip psm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "57400",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "hp-ux b.11.31 (11i",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "v3)",
         },
         {
            model: "9.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.0",
         },
         {
            model: "big-ip wom hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408956",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8731",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "colorqube",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "93010",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.2",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0.6",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8807903",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "9.2-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge clients for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7101",
         },
         {
            model: "big-ip analytics hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36305466",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "7.0-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7845072.040.134.32804",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.0.9.8",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "workcentre spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7545061.121.225.06100",
         },
         {
            model: "10.0-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x4407917",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v8400",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36505460",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087220",
         },
         {
            model: "big-ip edge clients for mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "x7080",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8734",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.00",
         },
         {
            model: "storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "79700",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "9.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.0.1",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7970072.200.134.32804",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "big-ip psm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "workcentre",
            scope: "eq",
            trust: 0.3,
            vendor: "xerox",
            version: "75350",
         },
         {
            model: "big-ip edge clients for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "7080",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7220072.030.134.32804",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "aura communication manager utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "colorqube r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "9303072.180.134.32804",
         },
         {
            model: "enterprise linux desktop workstation client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "big-ip edge clients for apple ios",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0.5",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "workcentre",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "5735061.132.224.35203",
         },
         {
            model: "big-ip edge gateway hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "8.2-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x325054580",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "big-ip edge gateway hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "7855072.040.134.32804",
         },
         {
            model: "workcentre r14-11 spar",
            scope: "ne",
            trust: 0.3,
            vendor: "xerox",
            version: "6655072.060.134.32804",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "big-ip psm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "6.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "6.4-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "69082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:virtual_connect",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Felix Gr&amp;amp;ouml;bert",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2014-3510",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3510",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3510",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-3510",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201408-130",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3510",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8zb, 1.0.0n, and 1.0.1i are vulnerable. OpenSSL Security Advisory [6 Aug 2014]\n========================================\n\nInformation leak in pretty printing functions (CVE-2014-3508)\n=============================================================\n\nA flaw in OBJ_obj2txt may cause pretty printing functions such as\nX509_name_oneline, X509_name_print_ex et al. to leak some information from the\nstack. Applications may be affected if they echo pretty printing output to the\nattacker. OpenSSL SSL/TLS clients and servers themselves are not affected. \n\nThanks to Ivan Fratric (Google) for discovering this issue. This issue\nwas reported to OpenSSL on 19th June 2014. \n\nThe fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL\ndevelopment team. This can\nbe exploited through a Denial of Service attack. \n\nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 2nd July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nOpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this\nissue. This issue was reported to OpenSSL on 8th July 2014. \n\nThe fix was developed by Gabor Tyukasz. \n\n\nDouble Free when processing DTLS packets (CVE-2014-3505)\n========================================================\n\nAn attacker can force an error condition which causes openssl to crash whilst\nprocessing DTLS packets due to memory being freed twice. This can be exploited\nthrough a Denial of Service attack. \n\nThanks to Adam Langley and Wan-Teh Chang (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 6th June\n2014. \n\nThe fix was developed by Adam Langley. This can be exploited through a Denial of\nService attack. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. This can be exploited through a Denial of Service attack. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. \n\nOpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)\n===============================================================\n\nOpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a\ndenial of service attack. \n\nOpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i. \n\nThanks to Felix Gröbert (Google) for discovering and researching this issue. \nThis issue was reported to OpenSSL on 18th July 2014. \n\nThe fix was developed by Emilia Käsper of the OpenSSL development team. \n\nOpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i. \n\nThanks to David Benjamin and Adam Langley (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 21st July 2014. \n\nThe fix was developed by David Benjamin. \n\n\nSRP buffer overrun (CVE-2014-3512)\n==================================\n\nA malicious client or server can send invalid SRP parameters and overrun\nan internal buffer. Only applications which are explicitly set up for SRP\nuse are affected. \n\nThanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC\nGroup) for discovering this issue. This issue was reported to OpenSSL\non 31st July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20140806.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \nCorrected:      2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE)\n                2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8)\n                2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE)\n                2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1)\n                2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11)\n                2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18)\n                2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE)\n                2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15)\nCVE Name:       CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510,\n                CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-5139]\n\nIII.  Additionally, a remote attacker may be able\nto run arbitrary code on a vulnerable system if the application has been\nset up for SRP. \n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 9.2, 9.1, 8.4]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc\n# gpg --verify openssl-9.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r269687\nreleng/8.4/                                                       r271305\nstable/9/                                                         r269687\nreleng/9.1/                                                       r271305\nreleng/9.2/                                                       r271305\nreleng/9.3/                                                       r271305\nstable/10/                                                        r269686\nreleng/10.0/                                                      r271304\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. \n\nRelease Date: 2014-08-14\nLast Updated: 2014-08-14\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized\naccess. \n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nOpenSSL. These vulnerabilities could be exploited remotely to create a Denial\nof Service (DoS), allow unauthorized access. \nHP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before 0.9.8zb\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-3505    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2014-3506    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2014-3507    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2014-3508    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-3510    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to resolve these vulnerabilities. The\nupdates are available from https://h20392.www2.hp.com/portal/swdepot/displayP\nroductInfo.do?productNumber=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n OpenSSL_A.00.09.08zb.001_HP-UX_B.11.11_32_64.depot\n\nB.11.23 (11i v2)\n OpenSSL_A.00.09.08zb.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n OpenSSL_A.00.09.08zb.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08zb or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zb.001 or subsequent\n\nHP-UX B.11.23\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zb.002 or subsequent\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zb.003 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 15 August 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security update\nAdvisory ID:       RHSA-2014:1052-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-1052.html\nIssue date:        2014-08-13\nCVE Names:         CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 \n                   CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 \n                   CVE-2014-3511 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nA race condition was found in the way OpenSSL handled ServerHello messages\nwith an included Supported EC Point Format extension. A malicious server\ncould possibly use this flaw to cause a multi-threaded TLS/SSL client using\nOpenSSL to write into freed memory, causing the client to crash or execute\narbitrary code. (CVE-2014-3509)\n\nIt was discovered that the OBJ_obj2txt() function could fail to properly\nNUL-terminate its output. This could possibly cause an application using\nOpenSSL functions to format fields of X.509 certificates to disclose\nportions of its memory. (CVE-2014-3508)\n\nA flaw was found in the way OpenSSL handled fragmented handshake packets. \nA man-in-the-middle attacker could use this flaw to force a TLS/SSL server\nusing OpenSSL to use TLS 1.0, even if both the client and the server\nsupported newer protocol versions. (CVE-2014-3511)\n\nMultiple flaws were discovered in the way OpenSSL handled DTLS packets. \nA remote attacker could use these flaws to cause a DTLS server or client\nusing OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3510)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions\n1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext\n1127499 - CVE-2014-3505 openssl: DTLS packet processing double free\n1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion\n1127502 - CVE-2014-3507 openssl: DTLS memory leak from zero-length fragments\n1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service\n1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.15.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nppc64:\nopenssl-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-static-1.0.1e-34.el7_0.4.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-static-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-static-1.0.1e-34.el7_0.4.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3505.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3506.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3507.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3508.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3509.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3510.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3511.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20140806.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFT69raXlSAg2UNWIIRAiQAAKCbp6Iou4mHuootBfgs0jm7zP/wWACgt50C\npHXxupQnHYYH+zJFOmk5u8o=\n=DwUW\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ============================================================================\nUbuntu Security Notice USN-2308-1\nAugust 07, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. This issue\nonly affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. When OpenSSL is used with certain\napplications, an attacker may use this issue to possibly gain access to\nsensitive information. This issue\nonly affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS\nand Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. This issue only affected Ubuntu 12.04 LTS and\nUbuntu 14.04 LTS. (CVE-2014-5139)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.5\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.17\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.20\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 5 client) - i386, x86_64\n\n3. (CVE-2014-3510)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original\nreporter of this issue. Description:\n\nRed Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1i-i486-1_slack14.1.txz:  Upgraded. \n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n30bdc015b10d8891b90d3f6ea34f5fdd  openssl-0.9.8zb-i486-1_slack13.0.txz\n3dc4140c22c04c94e5e74386a5a1c200  openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n3da32f51273762d67bf9dbcc91af9413  openssl-0.9.8zb-x86_64-1_slack13.0.txz\n075e5d12e5b909ecac923cb210f83544  openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n3b7e2bb2b317bf72b8f9b2b7a14bddfb  openssl-0.9.8zb-i486-1_slack13.1.txz\n92af0784eade0674332a56bfab73b97d  openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\ndf5f961109d7b50971660ca6a7d4c48c  openssl-0.9.8zb-x86_64-1_slack13.1.txz\n582aaeae3d56730a2e1538a67d4e44da  openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n546445d56d3b367fa0dd4e80859c4620  openssl-0.9.8zb-i486-1_slack13.37.txz\nb80e9df8cdd0649939ec2fab20d24691  openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n9c9ce97dc21340924a3e27c1a8047023  openssl-0.9.8zb-x86_64-1_slack13.37.txz\n0fe1931f2fc82fb8d5fbe72680caf843  openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nd1580f4b22b99cee42b22276653c8180  openssl-1.0.1i-i486-1_slack14.0.txz\nec93cec2bcab8ae7391a504573cbc231  openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n329475de3759225b1d02aa7317b2eb58  openssl-1.0.1i-x86_64-1_slack14.0.txz\n25f2a198022d974534986a3913ca705c  openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n8336457bc31d44ebf502ffc4443f12f7  openssl-1.0.1i-i486-1_slack14.1.txz\n4b99ac357fbd3065c53367eea246b8c7  openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nf2b8f81d9d7dc02e5d1011f663ccc95d  openssl-1.0.1i-x86_64-1_slack14.1.txz\n4360abffbb57cb18ba0720f782d78250  openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n49ecd332a899cf742d3467a6efe44269  a/openssl-solibs-1.0.1i-i486-1.txz\n27da017c49045981b1793f105aff365f  n/openssl-1.0.1i-i486-1.txz\n\nSlackware x86_64 -current packages:\n8d74f3d770802182137c84d925f58cbc  a/openssl-solibs-1.0.1i-x86_64-1.txz\nfd9d94d3210f0aedf74959cb0887e2b8  n/openssl-1.0.1i-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "BID",
            id: "69082",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "128248",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3510",
            trust: 3.8,
         },
         {
            db: "BID",
            id: "69082",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "61250",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59710",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60687",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61184",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60938",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60684",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61775",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60493",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59743",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60778",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61045",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61017",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59756",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60921",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61959",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60917",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59700",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60803",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60824",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61100",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60022",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58962",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1030693",
            trust: 1.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-24443",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3510",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169648",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128214",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127940",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128248",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127861",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128387",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127790",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127862",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128297",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127811",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "BID",
            id: "69082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "128248",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   id: "VAR-201408-0092",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.452548188,
   },
   last_update_date: "2024-11-29T21:20:37.219000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "HPSBHF03293",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04595951",
         },
         {
            title: "HPSBUX03095 SSRT101674",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04404655",
         },
         {
            title: "HPSBOV03099 SSRT101686",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04426586",
         },
         {
            title: "1682293",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            title: "1686997",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            title: "Fix DTLS anonymous EC(DH) denial of service",
            trust: 0.8,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=17160033765480453be0a41335fa6b833691c049",
         },
         {
            title: "OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)",
            trust: 0.8,
            url: "http://www.openssl.org/news/secadv_20140806.txt",
         },
         {
            title: "ELSA-2014-1053",
            trust: 0.8,
            url: "http://linux.oracle.com/errata/ELSA-2014-1053.html",
         },
         {
            title: "RHSA-2014:1297",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2014-1297.html",
         },
         {
            title: "RHSA-2014:1256",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2014-1256.html",
         },
         {
            title: "Huawei-SA-20141008-OpenSSL",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
         },
         {
            title: "TLSA-2014-6",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2014/TLSA-2014-6j.html",
         },
         {
            title: "openssl-1.0.0n",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51695",
         },
         {
            title: "openssl-0.9.8zb",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51694",
         },
         {
            title: "openssl-1.0.1i",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51696",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2308-1",
         },
         {
            title: "Debian Security Advisories: DSA-2998-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=bfd576c692d8814b2a331baf29ad367c",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-391",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-391",
         },
         {
            title: "Symantec Security Advisories: SA85 : OpenSSL Security Advisory 06-Aug-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=02a206cf2efb06aecdaf29aeca851b55",
         },
         {
            title: "oval",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/oval ",
         },
         {
            title: "wormhole",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/wormhole ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://www.openssl.org/news/secadv_20140806.txt",
         },
         {
            trust: 1.5,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1256.html",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            trust: 1.4,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:18.openssl.asc",
         },
         {
            trust: 1.4,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127503",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2014-1297.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/69082",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1053.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60687",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60824",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60917",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-008.txt.asc",
         },
         {
            trust: 1.1,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60938",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60921",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-2998",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61775",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61959",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59756",
         },
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-september/000196.html",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1030693",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:158",
         },
         {
            trust: 1.1,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61250",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61184",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61100",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61045",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61017",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60803",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60778",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60684",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60493",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60022",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59743",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59710",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59700",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58962",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1052.html",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95164",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=17160033765480453be0a41335fa6b833691c049",
         },
         {
            trust: 0.9,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3510",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3507",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/solutions/len-24443",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1052.html",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3512",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3505.html",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3506.html",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3508.html",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.4,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3510.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021317",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684903",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004917",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004931",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004872",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/84",
         },
         {
            trust: 0.3,
            url: "aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182969",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04426586",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04404655",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21684570",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2deee-50da9c14daae3/cert_mini_security_bulletin_xrx15a_v1-01.pdf",
         },
         {
            trust: 0.3,
            url: "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685467",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097658",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182784",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1054.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684913",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691005",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963783",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097903",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098264",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098585",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686182",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685967",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096510",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html?ref=rss",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966557",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.2,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=17160033765480453be0a41335fa6b833691c049",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=35207",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2308-1/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140806.txt>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:18.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayp",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://h71000.www7.hp.com/openvms/products/ssl/ssl.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3509.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3507.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3511.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.3",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.17",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.5",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2308-1",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1053.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=2.1.0",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "BID",
            id: "69082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "128248",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            db: "BID",
            id: "69082",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            db: "PACKETSTORM",
            id: "128248",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-13T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            date: "2014-08-06T00:00:00",
            db: "BID",
            id: "69082",
         },
         {
            date: "2014-08-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            date: "2014-08-06T12:12:12",
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            date: "2014-09-09T17:32:22",
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            date: "2014-08-20T15:20:13",
            db: "PACKETSTORM",
            id: "127940",
         },
         {
            date: "2014-09-15T17:53:34",
            db: "PACKETSTORM",
            id: "128248",
         },
         {
            date: "2014-08-14T02:24:57",
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            date: "2014-09-25T00:05:16",
            db: "PACKETSTORM",
            id: "128387",
         },
         {
            date: "2014-08-08T21:44:17",
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            date: "2014-08-14T02:25:06",
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            date: "2014-09-17T20:46:27",
            db: "PACKETSTORM",
            id: "128297",
         },
         {
            date: "2014-08-11T11:11:00",
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            date: "2014-08-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            date: "2014-08-13T23:55:07.577000",
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3510",
         },
         {
            date: "2016-07-26T23:01:00",
            db: "BID",
            id: "69082",
         },
         {
            date: "2015-06-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
         {
            date: "2022-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
         {
            date: "2024-11-21T02:08:16.117000",
            db: "NVD",
            id: "CVE-2014-3510",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127790",
         },
         {
            db: "PACKETSTORM",
            id: "127862",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-130",
         },
      ],
      trust: 0.8,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  s3_clnt.c Inside  ssl3_send_client_key_exchange Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-003815",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "69082",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0004
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. IBM Sterling B2B Integrator is prone to a remote information-disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information. This may aid in further attacks. IBM Sterling B2B Integrator 5.1 is vulnerable; other versions may also be affected. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. The vulnerability stems from the fact that the program creates session cookies in https sessions without setting security attributes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0004",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2012-5936",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2012-5936",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-59217",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2012-5936",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2012-5936",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201303-370",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-59217",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 do not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. IBM Sterling B2B Integrator is prone to a remote information-disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive   information. This may aid in further  attacks. \nIBM Sterling B2B Integrator 5.1 is vulnerable; other versions may also be affected. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. The vulnerability stems from the fact that the program creates session cookies in https sessions without setting security attributes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2012-5936",
            trust: 3.1,
         },
         {
            db: "BID",
            id: "58502",
            trust: 1,
         },
         {
            db: "XF",
            id: "80401",
            trust: 0.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "78073",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-59217",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   id: "VAR-201307-0004",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:07:50.743000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "1627985",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627985",
         },
         {
            title: "si_52_build_5020401_hotfix_3",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=46369",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-310",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627985",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/80401",
         },
         {
            trust: 0.9,
            url: "http://xforce.iss.net/xforce/xfdb/80401",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5936",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5936",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/58502",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21627985",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58502",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "BID",
            id: "78073",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            date: "2013-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            date: "2013-07-03T13:54:30.937000",
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-59217",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58502",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "BID",
            id: "78073",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
         {
            date: "2017-08-29T01:32:51.997000",
            db: "NVD",
            id: "CVE-2012-5936",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "58502",
         },
         {
            db: "BID",
            id: "78073",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway In  Cookie Vulnerability that is captured",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003192",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201303-370",
         },
      ],
      trust: 0.6,
   },
}

var-201506-0497
Vulnerability from variot

The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. An attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. OpenSSL Security Advisory [11 Jun 2015] =======================================

DHE man-in-the-middle protection (Logjam)

A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).

OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n

Fixes for this issue were developed by Emilia Käsper and Kurt Roeckx of the OpenSSL development team.

Malformed ECParameters causes infinite loop (CVE-2015-1788)

Severity: Moderate

When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field.

This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.

This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.

Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

Severity: Moderate

X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.

An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.

PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)

Severity: Moderate

The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.

Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.

CMS verify infinite loop with unknown hash function (CVE-2015-1792)

Severity: Moderate

When verifying a signedData message the CMS code can enter an infinite loop if presented with an unknown hash function OID.

This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Race condition handling NewSessionTicket (CVE-2015-1791)

Severity: Low

If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data.

This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg

This issue was discovered by Emilia Käsper of the OpenSSL development team. The fix was developed by Matt Caswell of the OpenSSL development team.

Invalid free in DTLS (CVE-2014-8176)

Severity: Moderate

This vulnerability does not affect current versions of OpenSSL. It existed in previous OpenSSL versions and was fixed in June 2014.

If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.

This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.

The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).

Note

As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt

Note: the online version of the advisory may be updated with additional details over time.

For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html

.

Release Date: 2015-07-10 Last Updated: 2015-07-10

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP IceWall Products running OpenSSL. Product Impacted Versions Impacted CVEs

HP IceWall MCRP v3.0 CVE-2015-1789 CVE-2015-1790 CVE-2015-1792

HP IceWall SSO Dfw v10.0 CVE-2015-1789 CVE-2015-1790 CVE-2015-1792

HP IceWall SSO Agent Option v10.0 CVE-2015-1789 CVE-2015-1790 CVE-2015-1792

HP IceWall SSO Certd v10.0 CVE-2015-1792

HP IceWall Federation Agent v3.0 CVE-2015-1792

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP recommends applying the latest OS vendor security patches for OpenSSL to resolve the vulnerabilities for HP IceWall Products.

HP IceWall SSO Dfw v10.0 and Certd v10.0, which are running on RHEL, could be using either the OS bundled OpenSSL library or the OpenSSL bundled with HP IceWall. If still using the OpenSSL bundled with HP IceWall, please apply the latest OS vendor security patches for OpenSSL and switch to the OpenSSL library bundled with the OS.

Documents are available at the following location with instructions to switch to the OS bundled OpenSSL library:

http://www.hp.com/jp/icewall_patchaccess

Note: The HP IceWall product is only available in Japan.

HISTORY Version:1 (rev.1) - 10 July 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o

Description

Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details.

Resolution

All OpenSSL 1.0.1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o"

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7"

References

[ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201506-02

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. This could allow remote attackers to cause a denial of service. This could allow remote attackers to cause a denial of service.

For the oldstable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u17.

For the stable distribution (jessie), these problems have been fixed in version 1.0.1k-3+deb8u1.

For the testing distribution (stretch), these problems have been fixed in version 1.0.2b-1.

For the unstable distribution (sid), these problems have been fixed in version 1.0.2b-1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

============================================================================= FreeBSD-SA-15:10.openssl Security Advisory The FreeBSD Project

Topic: Multiple OpenSSL vulnerabilities

Category: contrib Module: openssl Announced: 2015-06-12 Affects: All supported versions of FreeBSD. Corrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE) 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12) 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE) 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16) 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE) 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30) CVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 CVE-2015-1792, CVE-2015-4000

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.

II. [CVE-2015-1791]

The OpenSSL advisory also describes a problem that is identified as CVE-2014-8176, which is already fixed by an earlier FreeBSD Errata Notice, FreeBSD-EN-15:02.openssl.

III. [CVE-2015-4000]. [CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem was no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]

An attacker may be able to crash multi-thread applications that supports resumed TLS handshakes. [CVE-2015-1791]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.1]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc

gpg --verify openssl-10.1.patch.asc

[FreeBSD 9.3 and 8.4]

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch

fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc

gpg --verify openssl-8.4.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r284286 releng/8.4/ r284295 stable/9/ r284286 releng/9.3/ r284295 stable/10/ r284285 releng/10.1/ r284295


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.4 (FreeBSD)

iQIcBAEBCgAGBQJVeopGAAoJEO1n7NZdz2rnzhQP/Ak6el188Y+7QbEYVfCZ7eG8 BQLj5TMGHV5swSKVlPcEuBlMwTjpgB5Gqhc8luDS0eIAuJGdcMPSrZDdXxWQFtPf pbfIwp/ElFc7d6ut0Y8t6fFLJbhTOoHJpzTGkFRfJkjinGOx7OZQPeLJsxSubbnL JKugZ3diH6yk6IPMf9SvhO/kYXUF1VbXQvHNTnqgdhFVkgF6tK22Pkl2XoJ9EHbh vBXft1yJwiYlZ//DxZuScTUj1pHYzK3bOpg//REJMWCMj1RVwQr2EyDa0Q2cT02d eRnSZykXD69eybyzEck+BvwnUYYJICimnHuE5t78UIr0D/NWyOAZTQ99z5TID5aV HXkcil+1E/Q+xBB4+5UOOnESf6cmiWwewQOVvD26ZY39E6oJXvsrWnyxIuCG6DL9 sLtxB6iTYlTX5Civ/VJX8H7rFiw4UwMembthvGzck22026iHjplWM3GCWz0E8O3R PrXBHjAzNFawK3owNMxFSUFTuFw/qY7EEwJ3SKCEC+hoxcLOl26NMxrQKRIAUk+I MMOaZfvOh2uM19y9SJZz8+sqU8gIm7ihDm5fuSkO8kY0jdvLwyS9bXAejN/lZ6oJ TyfTDDyXDOdaPpnpQehh6vQV0NiaJ+WXfGhfiE8/G/t6b1E0LlCaaGJTpYkildGe vVCM4Nyx4S9WDFOi76ug =dyhg -----END PGP SIGNATURE----- . Summary:

Updated openssl packages that fix three security issues are now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790)

A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. (CVE-2015-4000)

Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys.

Red Hat would like to thank the OpenSSL project for reporting CVE-2015-1789 and CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, and Michal Zalewski as the original reporter of CVE-2015-1790. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source: openssl-0.9.8e-36.el5_11.src.rpm

i386: openssl-0.9.8e-36.el5_11.i386.rpm openssl-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-perl-0.9.8e-36.el5_11.i386.rpm

x86_64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-perl-0.9.8e-36.el5_11.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source: openssl-0.9.8e-36.el5_11.src.rpm

i386: openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm

x86_64: openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source: openssl-0.9.8e-36.el5_11.src.rpm

i386: openssl-0.9.8e-36.el5_11.i386.rpm openssl-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-perl-0.9.8e-36.el5_11.i386.rpm

ia64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.ia64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.ia64.rpm openssl-devel-0.9.8e-36.el5_11.ia64.rpm openssl-perl-0.9.8e-36.el5_11.ia64.rpm

ppc: openssl-0.9.8e-36.el5_11.ppc.rpm openssl-0.9.8e-36.el5_11.ppc64.rpm openssl-debuginfo-0.9.8e-36.el5_11.ppc.rpm openssl-debuginfo-0.9.8e-36.el5_11.ppc64.rpm openssl-devel-0.9.8e-36.el5_11.ppc.rpm openssl-devel-0.9.8e-36.el5_11.ppc64.rpm openssl-perl-0.9.8e-36.el5_11.ppc.rpm

s390x: openssl-0.9.8e-36.el5_11.s390.rpm openssl-0.9.8e-36.el5_11.s390x.rpm openssl-debuginfo-0.9.8e-36.el5_11.s390.rpm openssl-debuginfo-0.9.8e-36.el5_11.s390x.rpm openssl-devel-0.9.8e-36.el5_11.s390.rpm openssl-devel-0.9.8e-36.el5_11.s390x.rpm openssl-perl-0.9.8e-36.el5_11.s390x.rpm

x86_64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.x86_64.rpm openssl-perl-0.9.8e-36.el5_11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0497",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "15.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.3",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "8.4",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0r",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8zf",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "junos 12.1x44-d20",
            scope: null,
            trust: 0.9,
            vendor: "juniper",
            version: null,
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "hs series all versions",
         },
         {
            model: "sparc enterprise m3000 server",
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.9.5",
         },
         {
            model: "sparc enterprise m5000 server",
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: "hpe systems insight manager",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.01",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator probe option ver3.1.0.x to  ver4.1.0.x",
         },
         {
            model: "sparc enterprise m9000 server",
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.0",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.02",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "webotx sip application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1 to  v8.1",
         },
         {
            model: "sparc enterprise m4000 server",
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c cmm",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.8.5",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator agent ver3.3 to  ver4.1",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v4.2 to  v6.5",
         },
         {
            model: "hpe server migration pack",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.2",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.54",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v7.1",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.10 to  10.10.4",
         },
         {
            model: "ix2000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.0",
         },
         {
            model: "xcp",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "(sparc enterprise m3000/m4000/m5000/m8000/m9000 server )",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.2",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c ucm",
         },
         {
            model: "supply chain products suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle transportation management 6.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v7.1",
         },
         {
            model: "e-business suite",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "hpe insight control",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "none",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  sg3600lm/lg/lj v6.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v7.1 to  v8.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "systemmanager ver5.5.2 to  ver6.2.1",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.53",
         },
         {
            model: "hpe version control repository manager",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  intersecvm/sg v1.2",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.0",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v4.1 to  v6.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard v8.2 to  v9.2",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "jobcenter r14.1",
         },
         {
            model: "hpe matrix operating environment",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7500/nv5500/nv3500 series",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.1",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.4 to  v9.2",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard-j edition v4.1 to  v6.5",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0s",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7400/nv5400/nv3400 series",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator manager ver3.2.2 to  ver4.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2b",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1n",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "st ard edition v4.2 to  v6.5",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v4.0",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "mcoperations ver3.6.2 to  ver4.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "system management homepage",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v7.1 to  v8.1",
         },
         {
            model: "sparc enterprise m8000 server",
            scope: null,
            trust: 0.8,
            vendor: "oracle",
            version: null,
         },
         {
            model: "ix3000 series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "hpe insight control",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "server provisioning",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.1",
         },
         {
            model: "xcp",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "1121",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle exalogic infrastructure eecs 2.0.6.2.3",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "uddi registry v1.1 to  v7.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  univerge sg3000lg/lj",
         },
         {
            model: "capssuite",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0 to  v4.0 manager component",
         },
         {
            model: "junos 12.1x46-d25",
            scope: null,
            trust: 0.6,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3.0.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.2",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.0.0",
         },
         {
            model: "junos 12.1x44-d33",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "hp-ux b.11.22",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "junos 12.1x47-d25",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 14.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "open source siem",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "one-x client enablement services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "rational automation framework ifix4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "junos 13.3r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cms r16.3",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "netinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "storwize unified",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.2",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.6",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "ascenlink",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "7.2.3",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "rational automation framework ifix5",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "junos 12.1x44-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "rational automation framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "hp-ux b.11.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.13-34",
         },
         {
            model: "junos 12.1x44-d51",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.15",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.9",
         },
         {
            model: "workflow for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "junos 12.1x44-d34",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "junos 13.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "rational automation framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "imc products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "aura system platform sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.1x47-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.16-37",
         },
         {
            model: "junos 12.1x44-d50",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "enterprise linux server eus 6.6.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "junos 14.1r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "communications security gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0",
         },
         {
            model: "qradar incident forensics mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos 12.3x48-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.4-23",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "meeting exchange sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.25-57",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.18-43",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0.0.52",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.0.3",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.10.38",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "filenet system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.0.3",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.00",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 12.3x48-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.33",
         },
         {
            model: "junos 12.3r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1n",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "junos d30",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "enterprise content management system monitor fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.02",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "screenos 6.3.0r21",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5",
         },
         {
            model: "aura communication manager ssp04",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.11-28",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.3",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 15.1r2",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.8",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.03",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "junos 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.1",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational policy tester",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "junos 14.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "general parallel file system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.7",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.0",
         },
         {
            model: "enterprise content management system monitor interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "project openssl 1.0.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.1",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "one-x client enablement services sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "fortimail",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "screenos 6.3.0r19",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "cloud manager fp",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.32",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "rational automation framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "junos 12.3r6",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.14",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "security access manager for web appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "aura conferencing sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "junos 12.1x46-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.15-36",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.6",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "security network controller 1.0.3387m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "junos 12.1x44-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d40",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "junos 12.1x44-d30.4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "junos 15.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "junos d20",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "meeting exchange sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "50",
         },
         {
            model: "exalogic infrastructure eecs",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.213",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.14",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.8",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.6",
         },
         {
            model: "hp-ux b.11.11.16.09",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "mysql enterprise backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.12.3",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "screenos 6.3.0r22",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.4",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "rational automation framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry fixpack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.413",
         },
         {
            model: "junos 12.1x46-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.34",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.2a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.12",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.16",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2919",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "fortiweb",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "hp-ux b.11.11.13.14",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "junos 14.1r6",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.16",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "aura utility services sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "comware products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "70",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "meeting exchange sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "fortirecorder",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0.1",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5.0.0",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.3",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "hp-ux b.11.23.1.007",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortianalyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.0",
         },
         {
            model: "cloud manager if fp",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.252",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "forticlient windows/mac",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.3",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.29-9",
         },
         {
            model: "screenos 6.3.0r12",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3387",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "15.2",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security identity governance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cloud manager if fp",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.144",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "aura system manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "ds8870 r7.5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.2.0",
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "sdk for node.js for bluemix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0.12.4",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.18",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.3",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.12",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "junos 13.2x51-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "linux x86 64 -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.0.0",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "fortivoice enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0.6",
         },
         {
            model: "junos d10",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos 12.1x46-d35",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.8.3",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "hp-ux b.11.11.02.008",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.6",
         },
         {
            model: "junos 12.1x44-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.11",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.16",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.3.9.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.4",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.0",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.1",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 12.1x46-d55",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "meeting exchange",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.2",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "netinsight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0.14",
         },
         {
            model: "junos 12.1x47-d11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.1",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x46",
         },
         {
            model: "junos 12.3r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.3r7",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.15",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "fortisandbox",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "2.0",
         },
         {
            model: "http server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.5.10.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "project openssl 0.9.8zg",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 14.2r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.12",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.11",
         },
         {
            model: "junos 13.2x51-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "powerkvm build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.157",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "junos 13.2x51-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.1",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.1",
         },
         {
            model: "junos 12.1x47-d20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos d25",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "qradar siem mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "datapower gateways",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "security appscan enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.3",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "project openssl 1.0.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "junos d35",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x44",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4.0.1",
         },
         {
            model: "vcx products",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "qradar incident forensics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "aura application server sip core pb3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "junos 12.1x47-d45",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "qradar siem mr1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "junos 12.1x44-d40",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "junos 12.1x46-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "hp-ux b.11.11.17.02",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "fortimanager",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.9",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "screenos 6.3.0r13",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "aura presence services sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "aura presence services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.18-49",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.01",
         },
         {
            model: "fortiddos",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.1.5",
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "linux enterprise server sp4 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.6",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "hp-ux b.11.00",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura system manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "secure backup",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.3",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.5",
         },
         {
            model: "forticlient ios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.13-41",
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.9",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "forticlient android",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.6",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "sonas",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "hp-ux b.11.23.07.04",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.2",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "qradar incident forensics mr3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "aura conferencing sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "junos 12.3x48-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.5",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "unified security management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.3",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.10",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9-34",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "11.15",
         },
         {
            model: "aura application server sip core pb5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.1",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "aura session manager sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.02",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "junos 12.1x46-d40",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "junos 12.3r11",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.13",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "aura presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "linux enterprise server sp1 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "commerce experience manager",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.5.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "screenos 6.3.0r20",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "junos 13.3r7",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.4",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.2",
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "junos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1x47",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "aura session manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "project openssl 1.0.0r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 15.1x49-d10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "aura conferencing sp7",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "forticache",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2.1.0.9",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "messagesight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "aura application server sip core sp10",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.18-42",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "linux x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "aura application server sip core",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "53003.0",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "virtual connect enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "junos 14.1r5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "workload deployer if9",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.7",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.1",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "rational application developer for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "aura messaging",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aura system manager sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.10",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.13",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.4.1.2",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "tealeaf customer experience",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.2",
         },
         {
            model: "aura system platform sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "junos 12.3r9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.12",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "security proventia network active bypass",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1876",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "primavera p6 enterprise project portfolio management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.6",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.43",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "aura system platform sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.0",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "fsso build",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "235",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "junos 12.1x44-d26",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "hp-ux b.11.11.14.15",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "proactive contact",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "junos 12.1x44-d35.5",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "one-x client enablement services sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aura communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "sterling connect:direct for hp nonstop",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.6",
         },
         {
            model: "fortiadc",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.2",
         },
         {
            model: "junos 12.3x48-d30",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "aura system platform",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "aura utility services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "commerce guided search",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.3",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "mysql enterprise backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.0.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1",
         },
         {
            model: "operations agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "12.01",
         },
         {
            model: "unified security management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0.4",
         },
         {
            model: "transportation management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.1",
         },
         {
            model: "rational automation framework ifix1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1.2",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.15",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos 13.2x51-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.0",
         },
         {
            model: "endpoint manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "junos 12.1x46-d36",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d25",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "datapower gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.8",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "hp-ux b.11.11.15.13",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "aura conferencing sp6",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.2",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.05",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "open source siem",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "qradar incident forensics patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "communication server 1000m",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "operations agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.12",
         },
         {
            model: "communication server 1000e signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "junos 15.1x49-d20",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 14.2r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortiauthenticator",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "3.1",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "aura messaging sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.3",
         },
         {
            model: "iq",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "junos 12.1x46-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.1.7",
         },
         {
            model: "junos 12.1x47-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 12.1x44-d32",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "junos 13.2x51-d30",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "websphere cast iron",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.4",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "communication server 1000m signaling server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "rational team concert",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "aura system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "communication server 1000e",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.5",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "junos 12.3r10",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.214",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "15.04",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "qradar siem mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.19",
         },
         {
            model: "junos 12.1x44-d15",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "75157",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:e-business_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:fusion_middleware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:peoplesoft_products",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:supply_chain_products_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:oracle:sparc_enterprise_m3000_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:oracle:sparc_enterprise_m4000_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:oracle:sparc_enterprise_m5000_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:oracle:sparc_enterprise_m8000_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:oracle:sparc_enterprise_m9000_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:xcp",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:insight_control",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:matrix_operating_environment",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:server_migration_pack",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:systems_insight_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:version_control_repository_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:system_management_homepage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:capssuite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:istorage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:univerge",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_sip_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:websam",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Michal Zalewski of Google.",
      sources: [
         {
            db: "BID",
            id: "75157",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-1790",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2015-1790",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-1790",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-1790",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-1790",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\n\nFixes for this issue were developed by Emilia Käsper and Kurt Roeckx\nof the OpenSSL development team. \n\nMalformed ECParameters causes infinite loop (CVE-2015-1788)\n===========================================================\n\nSeverity: Moderate\n\nWhen processing an ECParameters structure OpenSSL enters an infinite loop if\nthe curve specified is over a specially malformed binary polynomial field. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates.  This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno Böck. The fix\nwas developed by Emilia Käsper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by  Michal\nZalewski (Google). The fix was developed by Emilia Käsper of the\nOpenSSL development team. \n\nCMS verify infinite loop with unknown hash function (CVE-2015-1792)\n===================================================================\n\nSeverity: Moderate\n\nWhen verifying a signedData message the CMS code can enter an infinite loop\nif presented with an unknown hash function OID. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nRace condition handling NewSessionTicket (CVE-2015-1791)\n========================================================\n\nSeverity: Low\n\nIf a NewSessionTicket is received by a multi-threaded client when attempting to\nreuse a previous ticket then a race condition can occur potentially leading to\na double free of the ticket data. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was discovered by Emilia Käsper of the OpenSSL development team. The\nfix was developed by Matt Caswell of the OpenSSL development team. \n\nInvalid free in DTLS (CVE-2014-8176)\n====================================\n\nSeverity: Moderate\n\nThis vulnerability does not affect current versions of OpenSSL. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. \n\nRelease Date: 2015-07-10\nLast Updated: 2015-07-10\n\nPotential Security Impact: Remote Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP IceWall\nProducts running OpenSSL. \nProduct\n Impacted Versions\n Impacted CVEs\n\nHP IceWall MCRP\n v3.0\n CVE-2015-1789\nCVE-2015-1790\nCVE-2015-1792\n\nHP IceWall SSO Dfw\n v10.0\n CVE-2015-1789\nCVE-2015-1790\nCVE-2015-1792\n\nHP IceWall SSO Agent Option\n v10.0\n CVE-2015-1789\nCVE-2015-1790\nCVE-2015-1792\n\nHP IceWall SSO Certd\n v10.0\n CVE-2015-1792\n\nHP IceWall Federation Agent\n v3.0\n CVE-2015-1792\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-1789    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2015-1790    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-1792    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP recommends applying the latest OS vendor security patches for OpenSSL to\nresolve the vulnerabilities for HP IceWall Products. \n\n  HP IceWall SSO Dfw v10.0 and Certd v10.0, which are running on RHEL, could\nbe using either the OS bundled OpenSSL library or the OpenSSL bundled with HP\nIceWall. If still using the OpenSSL bundled with HP IceWall, please apply the\nlatest OS vendor security patches for OpenSSL and switch to the OpenSSL\nlibrary bundled with the OS. \n\n  Documents are available at the following location with instructions to\nswitch to the OS bundled OpenSSL library:\n\n    http://www.hp.com/jp/icewall_patchaccess\n\n  Note: The HP IceWall product is only available in Japan. \n\nHISTORY\nVersion:1 (rev.1) - 10 July 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl             < 1.0.1o               >= 0.9.8z_p7\n                                                            >= 1.0.1o\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1o\"\n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-8176\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176\n[ 2 ] CVE-2015-1788\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788\n[ 3 ] CVE-2015-1789\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789\n[ 4 ] CVE-2015-1790\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790\n[ 5 ] CVE-2015-1791\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791\n[ 6 ] CVE-2015-1792\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792\n[ 7 ] CVE-2015-4000\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201506-02\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. This\n    could allow remote attackers to cause a denial of service. This could allow remote attackers to cause\n    a denial of service. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 1.0.1e-2+deb7u17. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.0.1k-3+deb8u1. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 1.0.2b-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.2b-1. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-15:10.openssl                                    Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          Multiple OpenSSL vulnerabilities\n\nCategory:       contrib\nModule:         openssl\nAnnounced:      2015-06-12\nAffects:        All supported versions of FreeBSD. \nCorrected:      2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE)\n                2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12)\n                2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE)\n                2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16)\n                2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE)\n                2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30)\nCVE Name:       CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791\n                CVE-2015-1792, CVE-2015-4000\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:https://security.FreeBSD.org/>. \n\nI.   Background\n\nFreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nII. [CVE-2015-1791]\n\nThe OpenSSL advisory also describes a problem that is identified as\nCVE-2014-8176, which is already fixed by an earlier FreeBSD Errata\nNotice, FreeBSD-EN-15:02.openssl. \n\nIII. [CVE-2015-4000]. \n[CVE-2015-1788].  This affects FreeBSD 10.1 only, as the problem\nwas no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]\n\nAn attacker may be able to crash multi-thread applications that\nsupports resumed TLS handshakes. [CVE-2015-1791]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc\n# gpg --verify openssl-10.1.patch.asc\n\n[FreeBSD 9.3 and 8.4]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r284286\nreleng/8.4/                                                       r284295\nstable/9/                                                         r284286\nreleng/9.3/                                                       r284295\nstable/10/                                                        r284285\nreleng/10.1/                                                      r284295\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. References\n\n<URL:https://www.openssl.org/news/secadv_20150611.txt>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788> \n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792>\n\n<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>\n\nThe latest revision of this advisory is available at\n<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:10.openssl.asc>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.4 (FreeBSD)\n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\nvVCM4Nyx4S9WDFOi76ug\n=dyhg\n-----END PGP SIGNATURE-----\n. Summary:\n\nUpdated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. \n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash. \n(CVE-2015-1790)\n\nA flaw was found in the way the TLS protocol composes the Diffie-Hellman \n(DH) key exchange. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenSSL to \nreject DH key sizes below 768 bits, which prevents sessions to be \ndowngraded to export-grade keys. \n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2015-1789\nand CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno Böck as\nthe original reporters of CVE-2015-1789, and Michal Zalewski as the\noriginal reporter of CVE-2015-1790. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time\n1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl-0.9.8e-36.el5_11.src.rpm\n\ni386:\nopenssl-0.9.8e-36.el5_11.i386.rpm\nopenssl-0.9.8e-36.el5_11.i686.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i386.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i686.rpm\nopenssl-perl-0.9.8e-36.el5_11.i386.rpm\n\nx86_64:\nopenssl-0.9.8e-36.el5_11.i686.rpm\nopenssl-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i686.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-perl-0.9.8e-36.el5_11.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nopenssl-0.9.8e-36.el5_11.src.rpm\n\ni386:\nopenssl-debuginfo-0.9.8e-36.el5_11.i386.rpm\nopenssl-devel-0.9.8e-36.el5_11.i386.rpm\n\nx86_64:\nopenssl-debuginfo-0.9.8e-36.el5_11.i386.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-devel-0.9.8e-36.el5_11.i386.rpm\nopenssl-devel-0.9.8e-36.el5_11.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl-0.9.8e-36.el5_11.src.rpm\n\ni386:\nopenssl-0.9.8e-36.el5_11.i386.rpm\nopenssl-0.9.8e-36.el5_11.i686.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i386.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i686.rpm\nopenssl-devel-0.9.8e-36.el5_11.i386.rpm\nopenssl-perl-0.9.8e-36.el5_11.i386.rpm\n\nia64:\nopenssl-0.9.8e-36.el5_11.i686.rpm\nopenssl-0.9.8e-36.el5_11.ia64.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i686.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.ia64.rpm\nopenssl-devel-0.9.8e-36.el5_11.ia64.rpm\nopenssl-perl-0.9.8e-36.el5_11.ia64.rpm\n\nppc:\nopenssl-0.9.8e-36.el5_11.ppc.rpm\nopenssl-0.9.8e-36.el5_11.ppc64.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.ppc.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.ppc64.rpm\nopenssl-devel-0.9.8e-36.el5_11.ppc.rpm\nopenssl-devel-0.9.8e-36.el5_11.ppc64.rpm\nopenssl-perl-0.9.8e-36.el5_11.ppc.rpm\n\ns390x:\nopenssl-0.9.8e-36.el5_11.s390.rpm\nopenssl-0.9.8e-36.el5_11.s390x.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.s390.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.s390x.rpm\nopenssl-devel-0.9.8e-36.el5_11.s390.rpm\nopenssl-devel-0.9.8e-36.el5_11.s390x.rpm\nopenssl-perl-0.9.8e-36.el5_11.s390x.rpm\n\nx86_64:\nopenssl-0.9.8e-36.el5_11.i686.rpm\nopenssl-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i386.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.i686.rpm\nopenssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-devel-0.9.8e-36.el5_11.i386.rpm\nopenssl-devel-0.9.8e-36.el5_11.x86_64.rpm\nopenssl-perl-0.9.8e-36.el5_11.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-1789\nhttps://access.redhat.com/security/cve/CVE-2015-1790\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20150611.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "BID",
            id: "75157",
         },
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132637",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132291",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132508",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-1790",
            trust: 2.9,
         },
         {
            db: "JUNIPER",
            id: "JSA10694",
            trust: 1.4,
         },
         {
            db: "JUNIPER",
            id: "JSA10733",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "75157",
            trust: 1.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.1,
         },
         {
            db: "BID",
            id: "91787",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1032564",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10122",
            trust: 1.1,
         },
         {
            db: "JVN",
            id: "JVNVU91445763",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-1790",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169629",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132637",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132398",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132291",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132288",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137292",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132508",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "BID",
            id: "75157",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132637",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132291",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132508",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   id: "VAR-201506-0497",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.27443620166666666,
   },
   last_update_date: "2024-11-29T20:49:38.516000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205031",
         },
         {
            title: "HT205031",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/HT205031",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl",
         },
         {
            title: "PKCS#7: Fix NULL dereference with missing EncryptedContent.",
            trust: 0.8,
            url: "https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686",
         },
         {
            title: "HPSBUX03388",
            trust: 0.8,
            url: "http://marc.info/?l=bugtraq&amp;m=143880121627664&amp;w=2",
         },
         {
            title: "HPSBMU03611",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888",
         },
         {
            title: "HPSBMU03612",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380",
         },
         {
            title: "HPSBHF03613",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05184351",
         },
         {
            title: "HPSBMU03546",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05045763",
         },
         {
            title: "HPSBMU03589",
            trust: 0.8,
            url: "https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044",
         },
         {
            title: "アライドテレシス株式会社からの情報",
            trust: 0.8,
            url: "http://jvn.jp/vu/JVNVU91445763/522154/index.html",
         },
         {
            title: "NV15-010",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv15-010.html",
         },
         {
            title: "OpenSSL vulnerabilities",
            trust: 0.8,
            url: "https://www.openssl.org/news/vulnerabilities.html",
         },
         {
            title: "Tarballs",
            trust: 0.8,
            url: "https://www.openssl.org/source/",
         },
         {
            title: "[11 Jun 2015] DHE man-in-the-middle protection (Logjam)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - April 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015verbose-2367954.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - April 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
         },
         {
            title: "Oracle Critical Patch Update CVSS V2 Risk Matrices - April 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html",
         },
         {
            title: "Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            title: "April 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/april_2016_critical_patch_update",
         },
         {
            title: "October 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2015_critical_patch_update",
         },
         {
            title: "July 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/july_2016_critical_patch_update",
         },
         {
            title: "January 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2016_critical_patch_update",
         },
         {
            title: "JSA10694",
            trust: 0.8,
            url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
         },
         {
            title: "TLSA-2015-14",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2015/TLSA-2015-14j.html",
         },
         {
            title: "cisco-sa-20150612-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1129/1129443_cisco-sa-20150612-openssl-j.html",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/",
         },
         {
            title: "Red Hat: CVE-2015-1790",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-1790",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2639-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-550",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-550",
         },
         {
            title: "Tenable Security Advisories: [R7] OpenSSL '20150611' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-07",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150612-openssl",
         },
         {
            title: "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=69e9536e77203a3c76b24dd89f4f9300",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://www.openssl.org/news/secadv_20150611.txt",
         },
         {
            trust: 1.4,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10694",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 1.4,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1115.html",
         },
         {
            trust: 1.4,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl",
         },
         {
            trust: 1.2,
            url: "https://security.gentoo.org/glsa/201506-02",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-1197.html",
         },
         {
            trust: 1.1,
            url: "https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/kb/ht205031",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/91787",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/75157",
         },
         {
            trust: 1.1,
            url: "https://openssl.org/news/secadv/20150611.txt",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733",
         },
         {
            trust: 1.1,
            url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "https://bto.bluecoat.com/security-advisory/sa98",
         },
         {
            trust: 1.1,
            url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05353965",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.1,
            url: "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10122",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160647.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160436.html",
         },
         {
            trust: 1.1,
            url: "http://www.ubuntu.com/usn/usn-2639-1",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1032564",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2015/dsa-3287",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu91445763/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1790",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965845",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/13",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10733&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04739301",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05353965",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/135",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1022647",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1022724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005313",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962520",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963232",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963954",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965415",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966252",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012435",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101013879",
         },
         {
            trust: 0.3,
            url: "http://www.fortiguard.com/advisory/fg-ir-15-014/",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/101012547",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/5438/security-advisory-alienvault-v5-0-4-addresses-31-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963964",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005375",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962039",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961800",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961633",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963096",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960713",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964033",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21965401",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960157",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962493",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962623",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=0&uid=swg21963438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959518",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961438",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961569",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963270",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964113",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005314",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961837",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966481",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966484",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966847",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966873",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21967384",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968046",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968724",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21968871",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970020",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21970667",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21971238",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964030",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963603",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966381",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2639-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=44733",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/secpolicy.html",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/about/releasestrat.html),",
         },
         {
            trust: 0.1,
            url: "https://rt.openssl.org/ticket/display.html?id=3286",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/jp/icewall_patchaccess",
         },
         {
            trust: 0.1,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20150611.txt>",
         },
         {
            trust: 0.1,
            url: "https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4000>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/advisories/freebsd-sa-15:10.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791>",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch.asc",
         },
         {
            trust: 0.1,
            url: "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch",
         },
         {
            trust: 0.1,
            url: "https://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788>",
         },
         {
            trust: 0.1,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792>",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7995",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2007-6750",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3237",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2015",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0728",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7547",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2011-4969",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightcontrol",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-4000",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1789",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "BID",
            id: "75157",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132637",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132291",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132508",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            db: "BID",
            id: "75157",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            db: "PACKETSTORM",
            id: "132637",
         },
         {
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            db: "PACKETSTORM",
            id: "132291",
         },
         {
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            db: "PACKETSTORM",
            id: "132508",
         },
         {
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-06-12T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            date: "2015-06-11T00:00:00",
            db: "BID",
            id: "75157",
         },
         {
            date: "2015-06-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            date: "2015-06-11T12:12:12",
            db: "PACKETSTORM",
            id: "169629",
         },
         {
            date: "2015-07-10T15:43:15",
            db: "PACKETSTORM",
            id: "132637",
         },
         {
            date: "2015-06-22T14:14:00",
            db: "PACKETSTORM",
            id: "132398",
         },
         {
            date: "2015-06-15T15:43:16",
            db: "PACKETSTORM",
            id: "132291",
         },
         {
            date: "2015-06-12T13:25:28",
            db: "PACKETSTORM",
            id: "132288",
         },
         {
            date: "2016-06-02T19:12:12",
            db: "PACKETSTORM",
            id: "137292",
         },
         {
            date: "2015-07-01T02:01:05",
            db: "PACKETSTORM",
            id: "132508",
         },
         {
            date: "2015-06-12T19:59:03.413000",
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-12-13T00:00:00",
            db: "VULMON",
            id: "CVE-2015-1790",
         },
         {
            date: "2017-05-23T16:28:00",
            db: "BID",
            id: "75157",
         },
         {
            date: "2017-03-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
         {
            date: "2024-11-21T02:26:08.673000",
            db: "NVD",
            id: "CVE-2015-1790",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "75157",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  crypto/pkcs7/pk7_doit.c of  PKCS7_dataDecode Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-003082",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "75157",
         },
      ],
      trust: 0.3,
   },
}

var-201804-0276
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive product information via vectors related to an error page. IBM X-Force ID: 92072. Vendors have confirmed this vulnerability IBM X-Force ID: 92072 It is released as.Information may be obtained. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to obtain sensitive product information by sending a specially crafted URL request

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201804-0276",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
      ],
   },
   cve: "CVE-2014-0912",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2014-0912",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-68405",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 3.9,
                  id: "CVE-2014-0912",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0912",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-0912",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201804-1313",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-68405",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive product information via vectors related to an error page. IBM X-Force ID: 92072. Vendors have confirmed this vulnerability IBM X-Force ID: 92072 It is released as.Information may be obtained. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker could exploit this vulnerability to obtain sensitive product information by sending a specially crafted URL request",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0912",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-68405",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   id: "VAR-201804-0276",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:38:14.390000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1674739",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21674739",
         },
         {
            title: "ibm-sterling-cve20140912-info-disc (92072)",
            trust: 0.8,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92072",
         },
         {
            title: "IBM Sterling B2B Integrator  and IBM Sterling File Gateway Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79607",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21674739",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92072",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0912",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0912",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-04-20T00:00:00",
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            date: "2018-06-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            date: "2018-04-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            date: "2018-04-20T21:29:00.330000",
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-05-22T00:00:00",
            db: "VULHUB",
            id: "VHN-68405",
         },
         {
            date: "2018-06-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
         {
            date: "2018-04-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
         {
            date: "2024-11-21T02:03:01.717000",
            db: "NVD",
            id: "CVE-2014-0912",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  IBM Sterling File Gateway Vulnerable to information disclosure",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-008595",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201804-1313",
         },
      ],
      trust: 0.6,
   },
}

var-201807-0415
Vulnerability from variot

IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142967. Vendors have confirmed this vulnerability IBM X-Force ID: 142967 It is released as.Information may be obtained and information may be altered. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The software supports secure integration of complex B2B processes with diverse partner communities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0415",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "lte",
            trust: 1,
            vendor: "ibm",
            version: "5.2.6.3",
         },
         {
            model: "sterling file gateway",
            scope: "lte",
            trust: 1,
            vendor: "ibm",
            version: "2.2.6",
         },
         {
            model: "sterling file gateway",
            scope: "gte",
            trust: 1,
            vendor: "ibm",
            version: "2.2.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "gte",
            trust: 1,
            vendor: "ibm",
            version: "5.2.0.1",
         },
         {
            model: "sterling b2b integrator",
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.2.0 to  2.2.6",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.6",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.41",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.6.3",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.0.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "104910",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Vikas Khanna, and IBM.",
      sources: [
         {
            db: "BID",
            id: "104910",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2018-1563",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2018-1563",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-125908",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.3,
                  id: "CVE-2018-1563",
                  impactScore: 2.7,
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  trust: 2.8,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2018-1563",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "psirt@us.ibm.com",
                  id: "CVE-2018-1563",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2018-1563",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201807-1691",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-125908",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142967. Vendors have confirmed this vulnerability IBM X-Force ID: 142967 It is released as.Information may be obtained and information may be altered. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The software supports secure integration of complex B2B processes with diverse partner communities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "BID",
            id: "104910",
         },
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
      ],
      trust: 1.98,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-125908",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-1563",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "104910",
            trust: 2,
         },
         {
            db: "EXPLOIT-DB",
            id: "45190",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-125908",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            db: "BID",
            id: "104910",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   id: "VAR-201807-0415",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:17:26.886000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "0717031",
            trust: 0.8,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
         },
         {
            title: "ibm-sterling-cve20181563-xss",
            trust: 0.8,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/142967",
         },
         {
            title: "IBM Sterling B2B Integrator Fixes for cross-site scripting vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82534",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/104910",
         },
         {
            trust: 1.7,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
         },
         {
            trust: 1.7,
            url: "https://www.exploit-db.com/exploits/45190/",
         },
         {
            trust: 1.7,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/142967",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1563",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1563",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ibm10717031",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            db: "BID",
            id: "104910",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            db: "BID",
            id: "104910",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-07-20T00:00:00",
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            date: "2018-07-26T00:00:00",
            db: "BID",
            id: "104910",
         },
         {
            date: "2018-10-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            date: "2018-07-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            date: "2018-07-20T16:29:00.620000",
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-10-09T00:00:00",
            db: "VULHUB",
            id: "VHN-125908",
         },
         {
            date: "2018-07-26T00:00:00",
            db: "BID",
            id: "104910",
         },
         {
            date: "2018-10-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
         {
            date: "2019-10-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
         {
            date: "2024-11-21T04:00:01.400000",
            db: "NVD",
            id: "CVE-2018-1563",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator Standard Edition Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-008160",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-1691",
         },
      ],
      trust: 0.6,
   },
}

var-201312-0171
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0171",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64443",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5405",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2013-5405",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-65407",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5405",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5405",
                  trust: 0.8,
                  value: "Low",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-443",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65407",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "BID",
            id: "64443",
         },
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5405",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "64443",
            trust: 1.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "20135405",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "87354",
            trust: 0.6,
         },
         {
            db: "AIXAPAR",
            id: "IC96053",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-65407",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            db: "BID",
            id: "64443",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   id: "VAR-201312-0171",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T22:52:54.506000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            title: "IC96053",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96053",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96053",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/64443",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87354",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5405",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5405",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87354",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            db: "BID",
            id: "64443",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64443",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            date: "2013-12-21T14:22:56.863000",
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65407",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64443",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
         {
            date: "2024-11-21T01:57:25.527000",
            db: "NVD",
            id: "CVE-2013-5405",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005673",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-443",
         },
      ],
      trust: 0.6,
   },
}

var-201312-0172
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, leading to improper interaction with the Windows MHTML protocol handler. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The following product versions are vulnerable: IBM Sterling B2B Integrator 5.2 IBM Sterling File Gateway 2.2. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML with specially crafted parameters

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0172",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "64446",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-5406",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "CVE-2013-5406",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-65408",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-5406",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-5406",
                  trust: 0.8,
                  value: "Low",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201312-444",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULHUB",
                  id: "VHN-65408",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2 and Sterling File Gateway 2.2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, leading to improper interaction with the Windows MHTML protocol handler. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nThe following product versions are vulnerable:\nIBM Sterling B2B Integrator 5.2\nIBM Sterling File Gateway 2.2. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML with specially crafted parameters",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "BID",
            id: "64446",
         },
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5406",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "64446",
            trust: 1.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
            trust: 0.7,
         },
         {
            db: "AIXAPAR",
            id: "IC96055",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "87355",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "20135406",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-65408",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            db: "BID",
            id: "64446",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   id: "VAR-201312-0172",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T21:45:30.100000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1657539",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            title: "IC96055",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96055",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1ic96055",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/64446",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/87355",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5406",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5406",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/87355",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            db: "BID",
            id: "64446",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-12-21T00:00:00",
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            date: "2013-12-04T00:00:00",
            db: "BID",
            id: "64446",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            date: "2013-12-21T14:22:56.893000",
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-65408",
         },
         {
            date: "2014-01-28T01:03:00",
            db: "BID",
            id: "64446",
         },
         {
            date: "2013-12-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
         {
            date: "2013-12-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
         {
            date: "2024-11-21T01:57:25.640000",
            db: "NVD",
            id: "CVE-2013-5406",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-005674",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201312-444",
         },
      ],
      trust: 0.6,
   },
}

var-201503-0055
Vulnerability from variot

The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. The Common Vulnerabilities and Exposures project identifies the following issues:

CVE-2015-0286

Stephen Henson discovered that the ASN1_TYPE_cmp() function
can be crashed, resulting in denial of service.

CVE-2015-0287

Emilia Kaesper discovered a memory corruption in ASN.1 parsing.

CVE-2015-0292

It was discovered that missing input sanitising in base64 decoding
might result in memory corruption.

CVE-2015-0209

It was discovered that a malformed EC private key might result in
memory corruption.

CVE-2015-0288

It was discovered that missing input sanitising in the
X509_to_X509_REQ() function might result in denial of service. In this update the export ciphers are removed

from the default cipher list.

Release Date: 2015-05-19 Last Updated: 2015-05-19

Potential Security Impact: Remote Denial of Service (DoS) and other vulnerabilities

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a remote Denial of Service (DoS) and other vulnerabilities.

References:

CVE-2015-0204 CVE-2015-0286 CVE-2015-0287 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-0209 CVE-2015-0288 SSRT102000

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zf

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-0204 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-0286 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0287 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0289 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0292 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2015-0293 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0209 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-0288 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to resolve these vulnerabilities. The updates are available from the following URL:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I

HP-UX Release HP-UX OpenSSL depot name

B.11.11 (11i v1) OpenSSL_A.00.09.08zf.001_HP-UX_B.11.11_32_64.depot

B.11.23 (11i v2) OpenSSL_A.00.09.08zf.002_HP-UX_B.11.23_IA-PA.depot

B.11.31 (11i v3) OpenSSL_A.00.09.08zf.003_HP-UX_B.11.31_IA-PA.depot

MANUAL ACTIONS: Yes - Update

Install HP-UX OpenSSL A.00.09.08zf or subsequent

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zf.001 or subsequent

HP-UX B.11.23

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zf.002 or subsequent

HP-UX B.11.31

openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zf.003 or subsequent

END AFFECTED VERSIONS

HISTORY Version:1 (rev.1) - 20 May 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security and bug fix update Advisory ID: RHSA-2015:0716-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0716.html Issue date: 2015-03-23 CVE Names: CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 =====================================================================

  1. Summary:

Updated openssl packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

An invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp() function. (CVE-2015-0286)

An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292)

A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293)

A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported. (CVE-2015-0209)

An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. (CVE-2015-0287)

A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. (CVE-2015-0288)

A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289)

Red Hat would like to thank the OpenSSL project for reporting CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, and CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL development team as the original reporter of CVE-2015-0286, Emilia Käsper of the OpenSSL development team as the original reporter of CVE-2015-0287, Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski of Google as the original reporter of CVE-2015-0289, Robert Dugal and David Ramos as the original reporters of CVE-2015-0292, and Sean Burford of Google and Emilia Käsper of the OpenSSL development team as the original reporters of CVE-2015-0293.

This update also fixes the following bug:

  • When a wrapped Advanced Encryption Standard (AES) key did not require any padding, it was incorrectly padded with 8 bytes, which could lead to data corruption and interoperability problems. With this update, the rounding algorithm in the RFC 5649 key wrapping implementation has been fixed. As a result, the wrapped key conforms to the specification, which prevents the described problems. (BZ#1197667)

All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import 1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp() 1202380 - CVE-2015-0287 openssl: ASN.1 structure reuse memory corruption 1202384 - CVE-2015-0289 openssl: PKCS7 NULL pointer dereference 1202395 - CVE-2015-0292 openssl: integer underflow leading to buffer overflow in base64 decoding 1202404 - CVE-2015-0293 openssl: assertion failure in SSLv2 servers 1202418 - CVE-2015-0288 openssl: X509_to_X509_REQ NULL pointer dereference

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-42.el7_1.4.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.4.i686.rpm openssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.4.i686.rpm openssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-static-1.0.1e-42.el7_1.4.i686.rpm openssl-static-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-42.el7_1.4.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.4.i686.rpm openssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.4.i686.rpm openssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-static-1.0.1e-42.el7_1.4.i686.rpm openssl-static-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.el7_1.4.src.rpm

ppc64: openssl-1.0.1e-42.el7_1.4.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.4.ppc.rpm openssl-devel-1.0.1e-42.el7_1.4.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.4.ppc.rpm openssl-libs-1.0.1e-42.el7_1.4.ppc64.rpm

s390x: openssl-1.0.1e-42.el7_1.4.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.s390x.rpm openssl-devel-1.0.1e-42.el7_1.4.s390.rpm openssl-devel-1.0.1e-42.el7_1.4.s390x.rpm openssl-libs-1.0.1e-42.el7_1.4.s390.rpm openssl-libs-1.0.1e-42.el7_1.4.s390x.rpm

x86_64: openssl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.4.i686.rpm openssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.4.i686.rpm openssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-42.ael7b_1.4.src.rpm

ppc64le: openssl-1.0.1e-42.ael7b_1.4.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.4.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.4.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.4.ppc64le.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-42.el7_1.4.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.4.ppc64.rpm openssl-static-1.0.1e-42.el7_1.4.ppc.rpm openssl-static-1.0.1e-42.el7_1.4.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-42.el7_1.4.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.s390x.rpm openssl-perl-1.0.1e-42.el7_1.4.s390x.rpm openssl-static-1.0.1e-42.el7_1.4.s390.rpm openssl-static-1.0.1e-42.el7_1.4.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-static-1.0.1e-42.el7_1.4.i686.rpm openssl-static-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.4.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.4.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.4.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-42.el7_1.4.src.rpm

x86_64: openssl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.4.i686.rpm openssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.4.i686.rpm openssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm openssl-static-1.0.1e-42.el7_1.4.i686.rpm openssl-static-1.0.1e-42.el7_1.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2015-0209 https://access.redhat.com/security/cve/CVE-2015-0286 https://access.redhat.com/security/cve/CVE-2015-0287 https://access.redhat.com/security/cve/CVE-2015-0288 https://access.redhat.com/security/cve/CVE-2015-0289 https://access.redhat.com/security/cve/CVE-2015-0292 https://access.redhat.com/security/cve/CVE-2015-0293 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFVEJ57XlSAg2UNWIIRApBLAKCABezmWbiQOlAWY6b+K6zE75PL1gCeOwR2 3cNZhN5KoBB3VDTmN7uiuVo= =e+xE -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2015:062 http://www.mandriva.com/en/support/security/


Package : openssl Date : March 27, 2015 Affected: Business Server 2.0


Problem Description:

Multiple vulnerabilities has been discovered and corrected in openssl:

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment (CVE-2010-5298).

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue became relevant after the CVE-2014-3568 fix (CVE-2014-3569).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).

The updated packages have been upgraded to the 1.0.1m version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS kz0ex6eI6hA6qSwklA2NoXY= =GYjX -----END PGP SIGNATURE----- . 6) - i386, x86_64

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1m-i486-1_slack14.1.txz: Upgraded. Fixes several bugs and security issues: o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286) o ASN.1 structure reuse memory corruption fix (CVE-2015-0287) o PKCS7 NULL pointer dereferences fix (CVE-2015-0289) o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293) o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209) o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288) o Removed the export ciphers from the DEFAULT ciphers For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zf-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zf-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zf-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1m-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1m-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1m-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1m-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1m-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1m-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1m-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1m-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1m-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1m-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1m-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1m-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 9ba57b2971962ceb6205ec7b7e6b84e7 openssl-0.9.8zf-i486-1_slack13.0.txz 706ef57bb71992961584a3d957c5dbcb openssl-solibs-0.9.8zf-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 5f581b663798eacc8e7df4c292f33dbf openssl-0.9.8zf-x86_64-1_slack13.0.txz fe5f33f4d2db08b4f8d724e62bf6e514 openssl-solibs-0.9.8zf-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 1ef0ba15454da786993361c927084438 openssl-0.9.8zf-i486-1_slack13.1.txz 2b3e20bcaa77f39512b6edcbc41b5471 openssl-solibs-0.9.8zf-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: f8fae10a1936cf900d362b65d9b2c8df openssl-0.9.8zf-x86_64-1_slack13.1.txz 0093e35c46382eeef03a51421895ed65 openssl-solibs-0.9.8zf-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 7d4dd0f76252c98622a5f5939f6f0674 openssl-0.9.8zf-i486-1_slack13.37.txz e5cde01c0773ac78d33964e4107878df openssl-solibs-0.9.8zf-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 379424e15bd378e00a5ba0c709432429 openssl-0.9.8zf-x86_64-1_slack13.37.txz 54832ad7e5440ce1c496be47fec9140d openssl-solibs-0.9.8zf-x86_64-1_slack13.37.txz

Slackware 14.0 packages: 8abafa33d2bf90b6cd8be849c0d9a643 openssl-1.0.1m-i486-1_slack14.0.txz bac56213a540586d801d7b57608396de openssl-solibs-1.0.1m-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: b4c6c971e74b678c68671feed18fa7dc openssl-1.0.1m-x86_64-1_slack14.0.txz acac871e22b5de998544c2f6431c0139 openssl-solibs-1.0.1m-x86_64-1_slack14.0.txz

Slackware 14.1 packages: c1f47f1f1ba5a13d6ac2ef2ae48bfb4c openssl-1.0.1m-i486-1_slack14.1.txz b7b1761ae1585f406d303273812043d3 openssl-solibs-1.0.1m-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: 1c6e11e2e3454836d5a3e9243f7c7738 openssl-1.0.1m-x86_64-1_slack14.1.txz 25b7a704816a2123463ddbfabbc1b86d openssl-solibs-1.0.1m-x86_64-1_slack14.1.txz

Slackware -current packages: 0926b2429e1326c8ab9bcbbda056dc66 a/openssl-solibs-1.0.1m-i486-1.txz b6252d0f141eba7b0a8e8c5bbdc314f0 n/openssl-1.0.1m-i486-1.txz

Slackware x86_64 -current packages: 99b903f556c7a2d5ec283f04c2f5a650 a/openssl-solibs-1.0.1m-x86_64-1.txz 9ecb47e0b70bd7f8064c96fb2211c4b7 n/openssl-1.0.1m-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1m-i486-1_slack14.1.txz openssl-solibs-1.0.1m-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Description:

This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)

  • This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)

  • This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)

  • This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)

  • This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)

  • A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)

  • A memory leak flaw was fixed in expat.

See the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory. Solution:

The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). JIRA issues fixed (https://issues.jboss.org/):

JBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0] JBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service

  1. ============================================================================ Ubuntu Security Notice USN-2537-1 March 19, 2015

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in OpenSSL. (CVE-2015-0209)

Stephen Henson discovered that OpenSSL incorrectly handled comparing ASN.1 boolean types. (CVE-2015-0286)

Emilia K=C3=A4sper discovered that OpenSSL incorrectly handled ASN.1 structure reuse. (CVE-2015-0287)

Brian Carpenter discovered that OpenSSL incorrectly handled invalid certificate keys. (CVE-2015-0288)

Michal Zalewski discovered that OpenSSL incorrectly handled missing outer ContentInfo when parsing PKCS#7 structures. (CVE-2015-0289)

Robert Dugal and David Ramos discovered that OpenSSL incorrectly handled decoding Base64 encoded data. (CVE-2015-0293)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.4

Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.11

Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.25

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.27

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0055",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "communications policy management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "9.9.1",
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "9.7.3",
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 1.1,
            vendor: "oracle",
            version: "10.4.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0q",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0o",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "lte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8ze",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0n",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0p",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.8 thats all  0.9.8zf",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0 thats all  1.0.0r",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1 thats all  1.0.1m",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.2 thats all  1.0.2a",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.10 to  10.10.3 (ht204942)",
         },
         {
            model: "mac os x",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.6.8 or later  10.11   (ht205267)",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9   (ipad 2 or later )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9   (iphone 4s or later )",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "9   (ipod touch first  5 after generation )",
         },
         {
            model: "mysql",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "5.6.25",
         },
         {
            model: "mysql",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "enterprise monitor 2.3.20",
         },
         {
            model: "mysql",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "enterprise monitor 3.0.22",
         },
         {
            model: "communications applications",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle enterprise session border controller ecz7.3m1p4",
         },
         {
            model: "communications policy management",
            scope: "lte",
            trust: 0.8,
            vendor: "oracle",
            version: "12.1.1",
         },
         {
            model: "enterprise manager",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "ops center 12.1.4",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "ops center 12.2.0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "ops center 12.2.1",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "ops center 12.3.0",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle business intelligence enterprise edition 11.1.1.7",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle business intelligence enterprise edition 11.1.1.9",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle endeca server 7.3.0.0",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle endeca server 7.4.0.0",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle endeca server 7.5.1.1",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle endeca server 7.6.1.0.0",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle exalogic infrastructure 2.0.6.2",
         },
         {
            model: "fusion middleware",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle tuxedo tuxedo 12.1.1.0",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.53",
         },
         {
            model: "peoplesoft products",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  peoplesoft enterprise peopletools 8.54",
         },
         {
            model: "secure backup",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.63",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.71",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.1",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.2",
         },
         {
            model: "hp icewall mcrp",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "2.1",
         },
         {
            model: "hp icewall mcrp",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "2.1 sp1",
         },
         {
            model: "hp icewall mcrp",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "2.1 sp2",
         },
         {
            model: "hp icewall mcrp",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "3.0",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "agent 8.0",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "agent 8.0 2007 update release 2",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "dfw 10.0",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "dfw 8.0",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "dfw 8.0 r1",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "dfw 8.0 r2",
         },
         {
            model: "hp icewall sso",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "dfw 8.0 r3",
         },
         {
            model: "csview",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/web questionnaire",
         },
         {
            model: "enterprisedirectoryserver",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver6.0 to  ver8.0",
         },
         {
            model: "enterpriseidentitymanager",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver2.0 to  8.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  intersecvm/sg v1.2",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v3.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v4.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  sg3600lm/lg/lj v6.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.2",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v7.1",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.0",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sg series  univerge sg3000lg/lj",
         },
         {
            model: "express5800",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/sigmablade em card (n8405-019/019a/043) firmware  rev.14.02 before",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "hs series",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7400/nv5400/nv3400 series",
         },
         {
            model: "istorage",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "nv7500/nv5500/nv3500 series",
         },
         {
            model: "ix2000 series",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver.8.7.22 all subsequent",
         },
         {
            model: "ix3000 series",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver.8.7.22 all subsequent",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.0",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.01",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.02",
         },
         {
            model: "secureware/pki application development kit",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ver3.1",
         },
         {
            model: "systemdirector enterprise",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "for java ( all models ) v5.1 to  v7.2",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c cmm",
         },
         {
            model: "univerge",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "3c ucm v8.5.4 before",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v4.2 to  v6.5",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard edition v4.2 to  v6.5",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard-j edition v4.1 to  v6.5",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "uddi registry v1.1 to  v7.1",
         },
         {
            model: "webotx",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v4.1 to  v6.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise edition v7.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "enterprise v8.2 to  v9.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "express v8.2 to  v9.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "foundation v8.2 to  v8.5",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard edition v7.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard v8.2 to  v9.2",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard-j edition v7.1 to  v8.1",
         },
         {
            model: "webotx application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "web edition v7.1 to  v8.1",
         },
         {
            model: "webotx enterprise service bus",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v6.4 to  v9.2",
         },
         {
            model: "webotx portal",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "v8.2 to  v9.1",
         },
         {
            model: "webotx sip application server",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "standard edition v7.1 to  v8.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator agent ver3.3 to  ver4.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator manager ver3.2.2 to  ver4.1",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "application navigator probe option ver3.1.0.x to  ver4.1.0.x",
         },
         {
            model: "websam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "jobcenter r14.1",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.6,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.6,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "hp-ux b.11.23 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v2)",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "netezza platform software 7.0.4.8-p2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.60",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.32",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "bladecenter advanced management module 25r5778",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network controller 1.0.3361m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.186",
         },
         {
            model: "algo one ase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "system networking rackswitch g8124e",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1948",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "gb esm ethernet switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1/107.4.11.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "virtual fabric 10gb switch module for bladecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.8.20.0",
         },
         {
            model: "icewall mcrp sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.211",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "pureapplication system interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.0.1",
         },
         {
            model: "sbr carrier",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "i operating system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.53",
         },
         {
            model: "virtual fabric 10gb switch module for bladecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.6.0",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "netezza platform software 7.0.4.7-p1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.41",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.20",
         },
         {
            model: "project openssl 0.9.8u",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.780",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "insight orchestration",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.1",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "cms",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "17.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "abyp-4tl-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.35",
         },
         {
            model: "communications session border controller scz7.4.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.1",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.2.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.24",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.4",
         },
         {
            model: "project openssl 1.0.2a",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.4",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.16",
         },
         {
            model: "netezza platform software 7.2.0.4-p3",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.16",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.3",
         },
         {
            model: "vios fp-25 sp-02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.3",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.6.1.0.0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3361",
         },
         {
            model: "sterling integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.10",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "netezza platform software 7.0.2.16-p3",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "project openssl 0.9.8zb",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.0-68",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.20",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.842",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "9",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.1",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0.870",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2-77",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.17",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "system networking rackswitch g8332",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.20.0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.1.0",
         },
         {
            model: "project openssl 1.0.1m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.840",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.4",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "5.0",
         },
         {
            model: "project openssl 1.0.0r",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2.77",
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.6.0",
         },
         {
            model: "flashsystem 9843-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.27",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.11",
         },
         {
            model: "project openssl 1.0.0m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.27",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.8",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.4",
         },
         {
            model: "g8264cs si fabric image",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.1",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "flex system cn4093 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "2.0",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "87.41.32.0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3",
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "qlogic 8gb intelligent pass-thru module & san switch module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.10.1.31.00",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.1",
         },
         {
            model: "gb esm ethernet switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1/107.4.10.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.96",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.0",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8720",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.0.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.23",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "flex system cn4093 10gb scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.1",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.2",
         },
         {
            model: "qradar security information and event manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.17",
         },
         {
            model: "netezza platform software 7.0.2.15-p1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6.156",
         },
         {
            model: "ds8700",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "87.31.16.0",
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "project openssl 1.0.1i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.13",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.13",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.1",
         },
         {
            model: "infosphere guardium database activity monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.0.0",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.10",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.12",
         },
         {
            model: "qradar security information and event manager patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.43",
         },
         {
            model: "flex system en4023 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.1c",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "virtual fabric 10gb switch module for bladecenter",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.8.21.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8886",
         },
         {
            model: "system networking rackswitch g8124e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.3.0",
         },
         {
            model: "cognos controller if4",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.10",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "communications session border controller scz7.3.0",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.7",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.9",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.03",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.21",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.3",
         },
         {
            model: "algo one pcre",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "aspera ondemand",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "qradar security information and event manager patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.42",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "bundle of g8264cs image",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "abyp-2t-1s-1l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.36",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.0.820",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.5.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.1",
         },
         {
            model: "security network controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.4",
         },
         {
            model: "netezza platform software 7.2.0.4-p2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.1.1",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "websphere mq",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "sterling connect:enterprise for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "infinity",
            scope: "ne",
            trust: 0.3,
            vendor: "pexip",
            version: "9.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1",
         },
         {
            model: "tssc/imc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.6",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.20",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.34",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7967",
         },
         {
            model: "abyp-2t-1s-1l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.68",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.102",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.6",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.3.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.4",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.1.830",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8852",
         },
         {
            model: "si4093 si fabric",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8750",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15-210",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.01",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "peoplesoft enterprise peopletools",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "8.54",
         },
         {
            model: "abyp-2t-2s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "security proventia network enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5.0",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling connect:enterprise for unix ifix03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.3",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3.1",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.0.2",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.08",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.9.1",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0-103",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.12.201",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.95",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.06",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.3",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "1.0",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.15",
         },
         {
            model: "cognos controller fp3 if2",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.8.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7.770",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0-95",
         },
         {
            model: "security network controller 1.0.3379m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.7",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.6",
         },
         {
            model: "project openssl 0.9.8za",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.19",
         },
         {
            model: "openscape voice r1.43.1",
            scope: "ne",
            trust: 0.3,
            vendor: "unify",
            version: "v7",
         },
         {
            model: "abyp-0t-4s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "algo one aggregation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.0.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "hp-ux b.11.11 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v1)",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "abyp-4ts-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.1",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.45",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.38",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.07",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.96",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.11150-11",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1.1",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.4",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "algo one ase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "abyp-10g-4lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "abyp-10g-4lr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.0",
         },
         {
            model: "qradar security information and event manager patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.44",
         },
         {
            model: "netezza platform software 7.0.4.8-p1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.2.127",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.800",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.1",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.10",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.02",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-109",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "ds8800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "86.31.123.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.07",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.1",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1881",
         },
         {
            model: "netezza platform software 7.1.0.4-p1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "openscape voice r1",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.1",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.5",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.9",
         },
         {
            model: "algo one mag",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7",
         },
         {
            model: "abyp-0t-0s-4l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.11",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.2",
         },
         {
            model: "abyp-4t-0s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1-73",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "aspera connect server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.780",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "cognos insight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2.4",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.9",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.4",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.6",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "abyp-0t-2s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "virtual fabric 10gb switch module for bladecenter",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.7.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.41",
         },
         {
            model: "storediq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.21",
         },
         {
            model: "integration bus",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0-14",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "sametime community server hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.2",
         },
         {
            model: "project openssl 0.9.8ze",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.19",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.04",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.63",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.5",
         },
         {
            model: "project openssl 1.0.0o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0.860",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.2",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "bladecenter -s",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7779",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.1",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.7.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5",
         },
         {
            model: "sametime community server limited use",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.02",
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0.870",
         },
         {
            model: "hp-ux b.11.31 (11i",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "v3)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6",
         },
         {
            model: "netezza platform software 7.0.4.8-p3",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system networking rackswitch g8332",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.19.0",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.20",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.0.1",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.12.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.40",
         },
         {
            model: "abyp-0t-2s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura conferencing",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.0",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.2",
         },
         {
            model: "ctpos 7.0r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0.840",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "business intelligence enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.1.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.14",
         },
         {
            model: "abyp-2t-0s-2l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.32",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.211",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.15210",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9.2",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.4.4.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.64",
         },
         {
            model: "abyp-10g-4sr-1-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "g8264cs si fabric image",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "security network controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "flex system en4023 10gb scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0",
         },
         {
            model: "alienvault",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "5.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.16",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.4",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.1",
         },
         {
            model: "rational tau interim fix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.6",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.8",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "rational software architect for websphere software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.0.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "enterprise session border controller ecz7.3m2p2",
            scope: null,
            trust: 0.3,
            vendor: "oracle",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "system networking rackswitch g8264cs",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.03",
         },
         {
            model: "version control repository manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3.740",
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "4.0",
         },
         {
            model: "system management homepage 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.0",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.411",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.213",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.2",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.4.0.4.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.1.0",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.2.0",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.17",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.0",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "87.31.38.0",
         },
         {
            model: "openscape voice r1.42.0",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v7",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9.2",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.3",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.2.0",
         },
         {
            model: "algo one pcre",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3",
         },
         {
            model: "ringmaster appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.1.2",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.1",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.28",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "infosphere information server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "netezza platform software 7.0.2.16-p1",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "bundle of g8264cs image",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.21",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.13",
         },
         {
            model: "sterling connect:express for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.6.1146-108",
         },
         {
            model: "aspera enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.5.1",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "cognos controller fp1 if1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "openscape voice r1.37.0",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v8",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.0.0",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.1",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vgw",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.0.820",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.4",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.1.0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "6.0",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.7.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2.835",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.41",
         },
         {
            model: "infosphere guardium for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.1",
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "netezza platform software 7.0.2.16-p2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "openscape voice r1.38.0",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v8",
         },
         {
            model: "abyp-10g-4sr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.33",
         },
         {
            model: "src series",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "openssh for gpfs",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.1",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.3.0",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.3.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.4",
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "3.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.213",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.26",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2.106",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.1.0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.3",
         },
         {
            model: "abyp-0t-4s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.03",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.1.830",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.3",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "secure global desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "4.71",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.3",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.5.1.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.1",
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.0",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.0.0",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "strm/jsa",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.14.20",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5.760",
         },
         {
            model: "aspera drive",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.1",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1",
         },
         {
            model: "rational insight",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.7",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "system networking rackswitch g8052",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.3.0",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.1.3",
         },
         {
            model: "netezza platform software 7.1.0.5-p2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.50",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "openscape voice r1.3.0",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v8",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15.1",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.210",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.3.1",
         },
         {
            model: "tuxedo",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.1.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.0.0",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.14",
         },
         {
            model: "i operating systems",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.2.0.2",
         },
         {
            model: "security network controller 1.0.3381m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "7.1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.9.0",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "cognos planning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "gb esm ethernet switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1/106.8.21.0",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "algo one mag",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.8",
         },
         {
            model: "websphere message broker",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.9",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tssc/imc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9.790",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.0.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1.730",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "5.1",
         },
         {
            model: "enterprise manager ops center",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "12.2.1",
         },
         {
            model: "rational tau interim fix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3.0.6",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.2",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "screenos",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.6",
         },
         {
            model: "bladecenter t advanced management module 32r0835",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.801",
         },
         {
            model: "flex system en2092 1gb ethernet scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "system storage san768b-2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "pureapplication system",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.1",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.80",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.4.0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.16",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.3",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.0.1",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.2",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "exalogic infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.0.6.2",
         },
         {
            model: "rational insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1.6",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "qradar security information and event manager patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.41",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.3",
         },
         {
            model: "aspera proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.2.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.03",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4.143",
         },
         {
            model: "cognos controller fp1 if1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "lotus protector for mail security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.8.1.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "openscape voice r1.43.1",
            scope: "ne",
            trust: 0.3,
            vendor: "unify",
            version: "v8",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.8",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.1",
         },
         {
            model: "project openssl 1.0.1j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.13",
         },
         {
            model: "bladecenter -t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8730",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.31",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.7",
         },
         {
            model: "gb esm ethernet switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1/106.8.20.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.6",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "abyp-0t-0s-4l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "87.31.2.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3.132",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.3.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.6",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "system networking rackswitch g8316",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.14",
         },
         {
            model: "flashsystem 9840-ae1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "840",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.14",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.1",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.12",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security access manager for web",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.13",
         },
         {
            model: "abyp-2t-2s-0l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0-12",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.1",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7989",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3381",
         },
         {
            model: "rational software architect",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.8.0",
         },
         {
            model: "abyp-4tl-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.1.104",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.3",
         },
         {
            model: "nsm",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "bladecenter -ht",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8740",
         },
         {
            model: "abyp-4ts-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.5",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0.860",
         },
         {
            model: "icewall mcrp sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "qlogic 8gb intelligent pass-thru module & san switch module",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.10.1.35.00",
         },
         {
            model: "infosphere guardium database activity monitoring",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.13",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "project openssl 1.0.0p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.12",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.4.0",
         },
         {
            model: "openscape voice r1",
            scope: "eq",
            trust: 0.3,
            vendor: "unify",
            version: "v8",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.3",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.8",
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.09",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aspera console",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.3",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "pulse secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.7.7",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.2",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.1.0.1",
         },
         {
            model: "worklight consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.14",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10",
         },
         {
            model: "abyp-10g-2sr-2lr-1-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5.146",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.14",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.1.73",
         },
         {
            model: "system networking rackswitch g8264t",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "power hmc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1.0.0",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.5.1.3",
         },
         {
            model: "project openssl 0.9.8zc",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.13",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.5",
         },
         {
            model: "icewall sso agent option update rele",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.2.0.3",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.18",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.8",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.6.8",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.25",
         },
         {
            model: "rational developer for i",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1.1",
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.1.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2.0",
         },
         {
            model: "system networking rackswitch g8124e",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "rational reporting for development intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0.6",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.4.34",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "alienvault",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.15",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.15",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3376",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1841",
         },
         {
            model: "endeca server",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7.4",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.010",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.1",
         },
         {
            model: "abyp-4t-0s-0l-p",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.41",
         },
         {
            model: "project openssl 0.9.8zd",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.2",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl 1.0.0h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.23",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.14",
         },
         {
            model: "websphere mq",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "netezza platform software 7.1.0.5-p3",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.10.4",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.1",
         },
         {
            model: "systems insight manager sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.8.179",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "project openssl 1.0.1k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "smartcloud entry fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2.010",
         },
         {
            model: "mq light",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "informix genero",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.40",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "junos os",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "ds8870",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "87.31.16.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "worklight foundation consumer edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "netezza platform software",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "bladecenter -h",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1886",
         },
         {
            model: "tivoli provisioning manager for os deployment build",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.151.05",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "system networking rackswitch g8124e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.13.0",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system networking rackswitch g8264",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.11.3.0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3.2.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control agent",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.5",
         },
         {
            model: "sterling connect:enterprise for unix ifix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.5.0.37",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1",
         },
         {
            model: "cognos metrics manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "2.3.20",
         },
         {
            model: "storwize unified",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v70001.3.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "system networking rackswitch g8124",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.9.14.0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.19",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.1.7",
         },
         {
            model: "real-time compression appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "worklight enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1.0.1",
         },
         {
            model: "secure backup",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10.3.0.1.0",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.212",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.01",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "8.4.1",
         },
         {
            model: "aspera orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "2.2.1",
         },
         {
            model: "sterling connect:express for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0",
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "worklight foundation enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.2.0.1",
         },
         {
            model: "ctpos 6.6r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "cognos controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "bladecenter -e",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8677",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "4.2.9",
         },
         {
            model: "communications policy management",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.1",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0.0.11",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "2.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1.4",
         },
         {
            model: "sametime unified telephony",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2.835",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.841",
         },
         {
            model: "security privileged identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.12",
         },
         {
            model: "pureapplication system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.13",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.32",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1.0.103",
         },
         {
            model: "workload deployer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.12",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.12",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "security network controller 1.0.3376m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9",
         },
         {
            model: "tivoli common reporting",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1",
         },
         {
            model: "aspera faspex",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "3.9",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.9",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "security network controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3379",
         },
         {
            model: "cognos insight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2.2",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "si4093 si fabric",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "predictiveinsight",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.2.7",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "security access manager for mobile",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "mobilefirst platform foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.0.0",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.60",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.0.121",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "aspera shares",
            scope: "eq",
            trust: 0.3,
            vendor: "asperasoft",
            version: "1.9",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0.2",
         },
         {
            model: "rational clearcase",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.2",
         },
         {
            model: "project openssl 0.9.8zf",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.7.5.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.0.0",
         },
         {
            model: "session border controller for enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.0",
         },
         {
            model: "flex system fabric en4093r 10gb scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.11.0",
         },
         {
            model: "sonas",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.5.0.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.7.770",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4",
         },
         {
            model: "insight orchestration",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.10",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.0d5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "enterprise manager ops center",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "12.1.0.1",
         },
         {
            model: "qradar security information and event manager mr2 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.110",
         },
         {
            model: "abyp-2t-0s-2l-p-m",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.1",
         },
         {
            model: "flex system fabric si4093 system interconnect module",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.8.10.0",
         },
         {
            model: "rational tau",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.33",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "rational clearquest",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2.7",
         },
         {
            model: "systems insight manager 7.4.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "6.1",
         },
         {
            model: "project openssl 1.0.1l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.4.750",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "security virtual server protection for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.1",
         },
         {
            model: "i operating system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "3.2.2",
         },
         {
            model: "project openssl 1.0.0q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "infinity",
            scope: "eq",
            trust: 0.3,
            vendor: "pexip",
            version: "7.0",
         },
         {
            model: "algo one core",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.8",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "ctpos 6.6r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.10.800",
         },
         {
            model: "contactoptimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cognos tm1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.18",
         },
         {
            model: "mysql enterprise monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "3.0.4",
         },
         {
            model: "cognos controller fp1 if2",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "10.2",
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1.9.790",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "73225",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:iphone_os",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:mysql",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:communications_applications",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:communications_policy_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:enterprise_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:fusion_middleware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:peoplesoft_products",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:secure_backup",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:virtualization_secure_global_desktop",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:icewall_mcrp",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:hp:icewall_sso",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:csview",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterprise_directoryserver",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:enterpriseidentitymanager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:express5800",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:istorage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix2000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:ix3000",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:secureware_pki_application_development_kit",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:systemdirector_enterprise",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:univerge",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_enterprise_service_bus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_portal",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:webotx_sip_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:websam",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Stephen Henson",
      sources: [
         {
            db: "BID",
            id: "73225",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-0286",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2015-0286",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2015-0286",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2015-0286",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "VULMON",
                  id: "CVE-2015-0286",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to crash the application, resulting in denial-of-service conditions. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-0286\n\n    Stephen Henson discovered that the ASN1_TYPE_cmp() function\n    can be crashed, resulting in denial of service. \n\nCVE-2015-0287\n\n    Emilia Kaesper discovered a memory corruption in ASN.1 parsing. \n\nCVE-2015-0292\n\n    It was discovered that missing input sanitising in base64 decoding\n    might result in memory corruption. \n\nCVE-2015-0209\n\n    It was discovered that a malformed EC private key might result in\n    memory corruption. \n\nCVE-2015-0288\n\n    It was discovered that missing input sanitising in the\n    X509_to_X509_REQ() function might result in denial of service. In this update the export ciphers are removed\nfrom the default cipher list. \n\nRelease Date: 2015-05-19\nLast Updated: 2015-05-19\n\nPotential Security Impact: Remote Denial of Service (DoS) and other\nvulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nOpenSSL. These vulnerabilities could be exploited remotely to create a remote\nDenial of Service (DoS) and other vulnerabilities. \n\nReferences:\n\nCVE-2015-0204\nCVE-2015-0286\nCVE-2015-0287\nCVE-2015-0289\nCVE-2015-0292\nCVE-2015-0293\nCVE-2015-0209\nCVE-2015-0288\nSSRT102000\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zf\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-0204    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2015-0286    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0287    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0289    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0292    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5\nCVE-2015-0293    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2015-0209    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2015-0288    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to resolve these vulnerabilities. The\nupdates are available from the following URL:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL depot name\n\nB.11.11 (11i v1)\n OpenSSL_A.00.09.08zf.001_HP-UX_B.11.11_32_64.depot\n\nB.11.23 (11i v2)\n OpenSSL_A.00.09.08zf.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n OpenSSL_A.00.09.08zf.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall HP-UX OpenSSL A.00.09.08zf or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zf.001 or subsequent\n\nHP-UX B.11.23\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zf.002 or subsequent\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zf.003 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 20 May 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security and bug fix update\nAdvisory ID:       RHSA-2015:0716-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2015-0716.html\nIssue date:        2015-03-23\nCVE Names:         CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 \n                   CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 \n                   CVE-2015-0293 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having Moderate security \nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give \ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nAn invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp()\nfunction. \n(CVE-2015-0286)\n\nAn integer underflow flaw, leading to a buffer overflow, was found in the\nway OpenSSL decoded malformed Base64-encoded inputs. Note: this flaw is not exploitable via the TLS/SSL protocol because\nthe data being transferred is not Base64-encoded. (CVE-2015-0292)\n\nA denial of service flaw was found in the way OpenSSL handled SSLv2\nhandshake messages. A remote attacker could use this flaw to cause a\nTLS/SSL server using OpenSSL to exit on a failed assertion if it had both\nthe SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293)\n\nA use-after-free flaw was found in the way OpenSSL imported malformed\nElliptic Curve private keys. A specially crafted key file could cause an\napplication using OpenSSL to crash when imported. (CVE-2015-0209)\n\nAn out-of-bounds write flaw was found in the way OpenSSL reused certain\nASN.1 structures. (CVE-2015-0287)\n\nA NULL pointer dereference flaw was found in OpenSSL's X.509 certificate\nhandling implementation. (CVE-2015-0288)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. An attacker able to make an application using OpenSSL\nverify, decrypt, or parse a specially crafted PKCS#7 input could cause that\napplication to crash. TLS/SSL clients and servers using OpenSSL were not\naffected by this flaw. (CVE-2015-0289)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292,\nand CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL\ndevelopment team as the original reporter of CVE-2015-0286, Emilia Käsper\nof the OpenSSL development team as the original reporter of CVE-2015-0287,\nBrian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski\nof Google as the original reporter of CVE-2015-0289, Robert Dugal and David\nRamos as the original reporters of CVE-2015-0292, and Sean Burford of\nGoogle and Emilia Käsper of the OpenSSL development team as the original\nreporters of CVE-2015-0293. \n\nThis update also fixes the following bug:\n\n* When a wrapped Advanced Encryption Standard (AES) key did not require any\npadding, it was incorrectly padded with 8 bytes, which could lead to data\ncorruption and interoperability problems. With this update, the rounding\nalgorithm in the RFC 5649 key wrapping implementation has been fixed. As a\nresult, the wrapped key conforms to the specification, which prevents the\ndescribed problems. (BZ#1197667)\n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import\n1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp()\n1202380 - CVE-2015-0287 openssl: ASN.1 structure reuse memory corruption\n1202384 - CVE-2015-0289 openssl: PKCS7 NULL pointer dereference\n1202395 - CVE-2015-0292 openssl: integer underflow leading to buffer overflow in base64 decoding\n1202404 - CVE-2015-0293 openssl: assertion failure in SSLv2 servers\n1202418 - CVE-2015-0288 openssl: X509_to_X509_REQ NULL pointer dereference\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.4.src.rpm\n\nppc64:\nopenssl-1.0.1e-42.el7_1.4.ppc64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.ppc64.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.ppc.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.ppc64.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.ppc.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-42.el7_1.4.s390x.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.s390x.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.s390.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.s390x.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.s390.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.ael7b_1.4.src.rpm\n\nppc64le:\nopenssl-1.0.1e-42.ael7b_1.4.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-42.ael7b_1.4.ppc64le.rpm\nopenssl-devel-1.0.1e-42.ael7b_1.4.ppc64le.rpm\nopenssl-libs-1.0.1e-42.ael7b_1.4.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.ppc64.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.ppc64.rpm\nopenssl-static-1.0.1e-42.el7_1.4.ppc.rpm\nopenssl-static-1.0.1e-42.el7_1.4.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.s390x.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.s390x.rpm\nopenssl-static-1.0.1e-42.el7_1.4.s390.rpm\nopenssl-static-1.0.1e-42.el7_1.4.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64le:\nopenssl-debuginfo-1.0.1e-42.ael7b_1.4.ppc64le.rpm\nopenssl-perl-1.0.1e-42.ael7b_1.4.ppc64le.rpm\nopenssl-static-1.0.1e-42.ael7b_1.4.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.4.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-0209\nhttps://access.redhat.com/security/cve/CVE-2015-0286\nhttps://access.redhat.com/security/cve/CVE-2015-0287\nhttps://access.redhat.com/security/cve/CVE-2015-0288\nhttps://access.redhat.com/security/cve/CVE-2015-0289\nhttps://access.redhat.com/security/cve/CVE-2015-0292\nhttps://access.redhat.com/security/cve/CVE-2015-0293\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVEJ57XlSAg2UNWIIRApBLAKCABezmWbiQOlAWY6b+K6zE75PL1gCeOwR2\n3cNZhN5KoBB3VDTmN7uiuVo=\n=e+xE\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory                         MDVSA-2015:062\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : openssl\n Date    : March 27, 2015\n Affected: Business Server 2.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been discovered and corrected in openssl:\n \n Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL\n through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows\n remote attackers to inject data across sessions or cause a denial of\n service (use-after-free and parsing error) via an SSL connection in\n a multithreaded environment (CVE-2010-5298). \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue\n became relevant after the CVE-2014-3568 fix (CVE-2014-3569). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n \n The updated packages have been upgraded to the 1.0.1m version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFVFTm1mqjQ0CJFipgRAoYFAKCaubn00colzVNnUBFjSElyDptGMQCfaGoS\nkz0ex6eI6hA6qSwklA2NoXY=\n=GYjX\n-----END PGP SIGNATURE-----\n. 6) - i386, x86_64\n\n3. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1m-i486-1_slack14.1.txz:  Upgraded. \n  Fixes several bugs and security issues:\n   o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)\n   o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)\n   o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)\n   o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)\n   o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)\n   o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)\n   o Removed the export ciphers from the DEFAULT ciphers\n  For more information, see:\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zf-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zf-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zf-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zf-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zf-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zf-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1m-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1m-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1m-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1m-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1m-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1m-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1m-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1m-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1m-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1m-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1m-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1m-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n9ba57b2971962ceb6205ec7b7e6b84e7  openssl-0.9.8zf-i486-1_slack13.0.txz\n706ef57bb71992961584a3d957c5dbcb  openssl-solibs-0.9.8zf-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n5f581b663798eacc8e7df4c292f33dbf  openssl-0.9.8zf-x86_64-1_slack13.0.txz\nfe5f33f4d2db08b4f8d724e62bf6e514  openssl-solibs-0.9.8zf-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n1ef0ba15454da786993361c927084438  openssl-0.9.8zf-i486-1_slack13.1.txz\n2b3e20bcaa77f39512b6edcbc41b5471  openssl-solibs-0.9.8zf-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\nf8fae10a1936cf900d362b65d9b2c8df  openssl-0.9.8zf-x86_64-1_slack13.1.txz\n0093e35c46382eeef03a51421895ed65  openssl-solibs-0.9.8zf-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n7d4dd0f76252c98622a5f5939f6f0674  openssl-0.9.8zf-i486-1_slack13.37.txz\ne5cde01c0773ac78d33964e4107878df  openssl-solibs-0.9.8zf-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n379424e15bd378e00a5ba0c709432429  openssl-0.9.8zf-x86_64-1_slack13.37.txz\n54832ad7e5440ce1c496be47fec9140d  openssl-solibs-0.9.8zf-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\n8abafa33d2bf90b6cd8be849c0d9a643  openssl-1.0.1m-i486-1_slack14.0.txz\nbac56213a540586d801d7b57608396de  openssl-solibs-1.0.1m-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\nb4c6c971e74b678c68671feed18fa7dc  openssl-1.0.1m-x86_64-1_slack14.0.txz\nacac871e22b5de998544c2f6431c0139  openssl-solibs-1.0.1m-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\nc1f47f1f1ba5a13d6ac2ef2ae48bfb4c  openssl-1.0.1m-i486-1_slack14.1.txz\nb7b1761ae1585f406d303273812043d3  openssl-solibs-1.0.1m-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\n1c6e11e2e3454836d5a3e9243f7c7738  openssl-1.0.1m-x86_64-1_slack14.1.txz\n25b7a704816a2123463ddbfabbc1b86d  openssl-solibs-1.0.1m-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n0926b2429e1326c8ab9bcbbda056dc66  a/openssl-solibs-1.0.1m-i486-1.txz\nb6252d0f141eba7b0a8e8c5bbdc314f0  n/openssl-1.0.1m-i486-1.txz\n\nSlackware x86_64 -current packages:\n99b903f556c7a2d5ec283f04c2f5a650  a/openssl-solibs-1.0.1m-x86_64-1.txz\n9ecb47e0b70bd7f8064c96fb2211c4b7  n/openssl-1.0.1m-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1m-i486-1_slack14.1.txz openssl-solibs-1.0.1m-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. Description:\n\nThis release of Red Hat JBoss Core Services httpd 2.4.23 serves as a\nreplacement for JBoss Core Services Apache HTTP Server 2.4.6. (CVE-2014-8176,\nCVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196,\nCVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799,\nCVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109,\nCVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762,\nCVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837,\nCVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705,\nCVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420,\nCVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459,\nCVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was\nfixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. \n\nSee the corresponding CVE pages linked to in the References section for\nmore information about each of the flaws listed in this advisory. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files). JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0]\nJBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service\n\n6. ============================================================================\nUbuntu Security Notice USN-2537-1\nMarch 19, 2015\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \n(CVE-2015-0209)\n\nStephen Henson discovered that OpenSSL incorrectly handled comparing ASN.1\nboolean types. (CVE-2015-0286)\n\nEmilia K=C3=A4sper discovered that OpenSSL incorrectly handled ASN.1 structure\nreuse. \n(CVE-2015-0287)\n\nBrian Carpenter discovered that OpenSSL incorrectly handled invalid\ncertificate keys. (CVE-2015-0288)\n\nMichal Zalewski discovered that OpenSSL incorrectly handled missing outer\nContentInfo when parsing PKCS#7 structures. (CVE-2015-0289)\n\nRobert Dugal and David Ramos discovered that OpenSSL incorrectly handled\ndecoding Base64 encoded data. (CVE-2015-0293)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.10:\n  libssl1.0.0                     1.0.1f-1ubuntu9.4\n\nUbuntu 14.04 LTS:\n  libssl1.0.0                     1.0.1f-1ubuntu2.11\n\nUbuntu 12.04 LTS:\n  libssl1.0.0                     1.0.1-4ubuntu5.25\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.27\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "BID",
            id: "73225",
         },
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "133317",
         },
         {
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            db: "PACKETSTORM",
            id: "131585",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "PACKETSTORM",
            id: "130914",
         },
      ],
      trust: 2.97,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2015-0286",
            trust: 3.3,
         },
         {
            db: "BID",
            id: "73225",
            trust: 1.4,
         },
         {
            db: "JUNIPER",
            id: "JSA10680",
            trust: 1.4,
         },
         {
            db: "SECTRACK",
            id: "1032917",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1031929",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10110",
            trust: 1.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-412672",
            trust: 1.1,
         },
         {
            db: "JVN",
            id: "JVNVU99970459",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97220341",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU95877131",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-349-21",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2015-0286",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131045",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130912",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "133317",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131940",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130990",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132763",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130982",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131585",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140182",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130914",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "BID",
            id: "73225",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "133317",
         },
         {
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            db: "PACKETSTORM",
            id: "131585",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "PACKETSTORM",
            id: "130914",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   id: "VAR-201503-0055",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.22222222,
   },
   last_update_date: "2024-11-29T20:56:05.011000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "APPLE-SA-2015-09-16-1 iOS 9",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html",
         },
         {
            title: "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
         },
         {
            title: "APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005",
            trust: 0.8,
            url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
         },
         {
            title: "HT204942",
            trust: 0.8,
            url: "http://support.apple.com/en-us/HT204942",
         },
         {
            title: "HT205267",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205267",
         },
         {
            title: "HT205212",
            trust: 0.8,
            url: "https://support.apple.com/en-us/HT205212",
         },
         {
            title: "HT204942",
            trust: 0.8,
            url: "http://support.apple.com/ja-jp/HT204942",
         },
         {
            title: "HT205212",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/HT205212",
         },
         {
            title: "HT205267",
            trust: 0.8,
            url: "https://support.apple.com/ja-jp/HT205267",
         },
         {
            title: "cisco-sa-20150320-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl",
         },
         {
            title: "HPSBGN03306 SSRT102007",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04626468",
         },
         {
            title: "アライドテレシス株式会社からの情報",
            trust: 0.8,
            url: "http://jvn.jp/vu/JVNVU95877131/522154/index.html",
         },
         {
            title: "NV15-015",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv15-015.html",
         },
         {
            title: "Fix ASN1_TYPE_cmp",
            trust: 0.8,
            url: "https://git.openssl.org/?p=openssl.git;a=commit;h=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1",
         },
         {
            title: "Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)",
            trust: 0.8,
            url: "https://www.openssl.org/news/secadv_20150319.txt",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015verbose-2367947.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2016 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016verbose-2881725.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - October 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015verbose-2367954.html",
         },
         {
            title: "Oracle Solaris Third Party Bulletin - January 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
         },
         {
            title: "Bug 1202366",
            trust: 0.8,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202366",
         },
         {
            title: "OpenSSL Updates of 19 March 2015",
            trust: 0.8,
            url: "https://access.redhat.com/articles/1384453",
         },
         {
            title: "RHSA-2015:0715",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2015-0715.html",
         },
         {
            title: "RHSA-2015:0716",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2015-0716.html",
         },
         {
            title: "RHSA-2015:0752",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/RHSA-2015-0752.html",
         },
         {
            title: "SA92",
            trust: 0.8,
            url: "https://bto.bluecoat.com/security-advisory/sa92",
         },
         {
            title: "January 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2016_critical_patch_update",
         },
         {
            title: "July 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/july_2015_critical_patch_update",
         },
         {
            title: "October 2016 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2016_critical_patch_update",
         },
         {
            title: "October 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/october_2015_critical_patch_update",
         },
         {
            title: "OpenSSLに複数の脆弱性 (19 Mar 2015)",
            trust: 0.8,
            url: "http://www.seil.jp/support/security/a01545.html",
         },
         {
            title: "cisco-sa-20150320-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1128/1128874_cisco-sa-20150320-openssl-j.html",
         },
         {
            title: "Red Hat: CVE-2015-0286",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-0286",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2537-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2015-498",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-498",
         },
         {
            title: "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162957 - Security Advisory",
         },
         {
            title: "Tenable Security Advisories: [R6] OpenSSL '20150319' Advisory Affects Tenable Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2015-04",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=2a43c5799a7dd07d6c0a92a3b040d12f",
         },
         {
            title: "Cisco: Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20150320-openssl",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1",
         },
         {
            title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eaf98750f1130c39e83765575c69e165",
         },
         {
            title: "Symantec Security Advisories: SA92 : OpenSSL Security Advisory 19-Mar-2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=07adc2b6f5910b64efc7296f227b9f10",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2016",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - April 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - July 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/Live-Hack-CVE/CVE-2015-0286 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-17",
            trust: 1,
         },
         {
            problemtype: "CWE-Other",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.5,
            url: "https://www.openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
         },
         {
            trust: 1.4,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
         },
         {
            trust: 1.4,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.2,
            url: "http://www.ubuntu.com/usn/usn-2537-1",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0716.html",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0715.html",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/articles/1384453",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/bid/73225",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2957.html",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202366",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152844.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152733.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-march/152734.html",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2015/dsa-3197",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html",
         },
         {
            trust: 1.1,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-15%3a06.openssl.asc",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1031929",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:063",
         },
         {
            trust: 1.1,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.1,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0752.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/156823.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-may/157177.html",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html",
         },
         {
            trust: 1.1,
            url: "http://support.apple.com/kb/ht204942",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/ht205212",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00001.html",
         },
         {
            trust: 1.1,
            url: "https://support.apple.com/ht205267",
         },
         {
            trust: 1.1,
            url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html",
         },
         {
            trust: 1.1,
            url: "https://bto.bluecoat.com/security-advisory/sa92",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.1,
            url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015",
         },
         {
            trust: 1.1,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10680",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10110",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1032917",
         },
         {
            trust: 1.1,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.1,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1",
         },
         {
            trust: 1.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu95877131/index.html",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu97220341/index.html",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu99970459/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0286",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0292",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2015-0286",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "https://www.alienvault.com/forums/discussion/4885/security-advisory-alienvault-v5-0-",
         },
         {
            trust: 0.3,
            url: "https://support.asperasoft.com/entries/93038317-security-bulletin-vulnerabilities-in-openssl",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04746490",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/apr/37",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/137",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/134",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/aug/136",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04679334",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005226",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005241",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005254",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21958089",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21961293",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962334",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966177",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098144",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020693",
         },
         {
            trust: 0.3,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21958903",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963024",
         },
         {
            trust: 0.3,
            url: "https://www.openssl.org/news/vulnerabilities.html",
         },
         {
            trust: 0.3,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
         },
         {
            trust: 0.3,
            url: "http://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2015-04-16.pdf",
         },
         {
            trust: 0.3,
            url: "https://networks.unify.com/security/advisories/obso-1512-01.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005341",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964676",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701028",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963783",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963964",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005375",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=swg21701256",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10680&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21882710",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022183",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964164",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903799",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022382",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701238",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099273",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902449",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902277",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21882644",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701054",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21957922",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902544",
         },
         {
            trust: 0.3,
            url: "www-01.ibm.com/support/docview.wss?uid=swg21701086",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21702160",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903269",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022367",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883028",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098141",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902519",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020716",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022103",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21902673",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883593",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099272",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700167",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005257",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903425",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21722409",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700411",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960212",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960210",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701354",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21883249",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961179",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098564",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098563",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098568",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964410",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21964686",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?rs=630&uid=swg21970748",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960588",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960668",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903261",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21694849",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903729",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701326",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883221",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883222",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21713653",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21701334",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21882955",
         },
         {
            trust: 0.3,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.3,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.3,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.3,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.3,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.3,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.3,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2015-0209",
         },
         {
            trust: 0.3,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.2,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.2,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.2,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0288",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0292",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0293",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0287",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2015-0289",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3523",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/17.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2537-1/",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=39581",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5432",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-5433",
         },
         {
            trust: 0.1,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.1,
            url: "https://www.hp.com/go/swa",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0207",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0118",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8142",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0226",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0231",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0285",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9653",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9705",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0232",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9427",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0208",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0273",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0231",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/go/smh",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-9652",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "https://issues.jboss.org/):",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3196",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4448",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2106",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0702",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0797",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-6808",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1835",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-3705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1838",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2107",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3196",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1839",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2177",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4483",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3523",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2842",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-8612",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2012-1148",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1840",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0797",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1836",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3185",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1833",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp&downloadtype=distributions&version=2.4.23",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8176",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1840",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1836",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1762",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1835",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4449",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1762",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-5420",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2178",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-3627",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2012-1148",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1837",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-2109",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-1834",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1837",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1839",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-5419",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4459",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2108",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0702",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-3216",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1838",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1833",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2105",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-1834",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-4447",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-7141",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.27",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.11",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.25",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.4",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "BID",
            id: "73225",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "133317",
         },
         {
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            db: "PACKETSTORM",
            id: "131585",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "PACKETSTORM",
            id: "130914",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            db: "BID",
            id: "73225",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            db: "PACKETSTORM",
            id: "133317",
         },
         {
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            db: "PACKETSTORM",
            id: "131585",
         },
         {
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            db: "PACKETSTORM",
            id: "130914",
         },
         {
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-03-19T00:00:00",
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            date: "2015-03-19T00:00:00",
            db: "BID",
            id: "73225",
         },
         {
            date: "2015-03-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            date: "2015-03-27T20:43:39",
            db: "PACKETSTORM",
            id: "131045",
         },
         {
            date: "2015-03-20T04:42:01",
            db: "PACKETSTORM",
            id: "130912",
         },
         {
            date: "2015-08-26T01:33:18",
            db: "PACKETSTORM",
            id: "133317",
         },
         {
            date: "2015-05-20T23:06:10",
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            date: "2015-03-24T17:07:18",
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2015-07-21T13:37:51",
            db: "PACKETSTORM",
            id: "132763",
         },
         {
            date: "2015-03-24T17:03:13",
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            date: "2015-04-22T20:14:53",
            db: "PACKETSTORM",
            id: "131585",
         },
         {
            date: "2016-12-16T16:34:49",
            db: "PACKETSTORM",
            id: "140182",
         },
         {
            date: "2015-03-20T04:43:46",
            db: "PACKETSTORM",
            id: "130914",
         },
         {
            date: "2015-03-19T22:59:04.677000",
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2015-0286",
         },
         {
            date: "2017-05-02T03:08:00",
            db: "BID",
            id: "73225",
         },
         {
            date: "2016-11-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
         {
            date: "2024-11-21T02:22:43.700000",
            db: "NVD",
            id: "CVE-2015-0286",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "131940",
         },
         {
            db: "PACKETSTORM",
            id: "130990",
         },
         {
            db: "PACKETSTORM",
            id: "130982",
         },
         {
            db: "PACKETSTORM",
            id: "130914",
         },
      ],
      trust: 0.4,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  crypto/asn1/a_type.c of  ASN1_TYPE_cmp Service disruption in functions  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-001881",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "73225",
         },
      ],
      trust: 0.3,
   },
}

var-201307-0127
Vulnerability from variot

The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. Successful exploits will allow attackers to obtain sensitive information. This may aid in further attacks. IBM Sterling B2B Integrator 5.1 is vulnerable; other versions may also be affected. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0127",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.4,
            vendor: "ibm",
            version: "2.2",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2013-0481",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2013-0481",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-60483",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-0481",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-0481",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201303-373",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-60483",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2013-0481",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception. \nSuccessful exploits will allow attackers to obtain sensitive   information. This may aid in further  attacks. \nIBM Sterling B2B Integrator 5.1 is vulnerable; other versions may also be affected. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-0481",
            trust: 2.9,
         },
         {
            db: "BID",
            id: "58498",
            trust: 1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "81546",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-60483",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   id: "VAR-201307-0127",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:27:30.481000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            title: "1627986",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627986",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21627986",
         },
         {
            trust: 1.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.2,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/81546",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0481",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0481",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/81546",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/58498",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21627986",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            db: "BID",
            id: "58498",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            date: "2013-07-03T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58498",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            date: "2013-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            date: "2013-07-03T13:54:31.020000",
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-60483",
         },
         {
            date: "2017-08-29T00:00:00",
            db: "VULMON",
            id: "CVE-2013-0481",
         },
         {
            date: "2013-03-11T00:00:00",
            db: "BID",
            id: "58498",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
         {
            date: "2017-08-29T01:33:03.213000",
            db: "NVD",
            id: "CVE-2013-0481",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Console trace stack vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003199",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201303-373",
         },
      ],
      trust: 0.6,
   },
}

var-201406-0137
Vulnerability from variot

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DTLS packets. The issue lies in the assumption that all fragments specify the same message size. An attacker could leverage this vulnerability to execute code in the context of the process using OpenSSL. The following are vulnerable: OpenSSL 0.9.8 prior to 0.9.8za OpenSSL 1.0.0 prior to 1.0.0m OpenSSL 1.0.1 prior to 1.0.1h. This update addresses the issues by updating PHP to version 5.4.30 CVE-ID CVE-2013-7345 CVE-2014-0185 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-3981 CVE-2014-4049

Bluetooth Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4390 : Ian Beer of Google Project Zero

CoreGraphics Available for: OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

CoreGraphics Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

Foundation Available for: OS X Mavericks 10.9 to 10.9.4 Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4393 : Apple

Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-4394 : Ian Beer of Google Project Zero CVE-2014-4395 : Ian Beer of Google Project Zero CVE-2014-4396 : Ian Beer of Google Project Zero CVE-2014-4397 : Ian Beer of Google Project Zero CVE-2014-4398 : Ian Beer of Google Project Zero CVE-2014-4399 : Ian Beer of Google Project Zero CVE-2014-4400 : Ian Beer of Google Project Zero CVE-2014-4401 : Ian Beer of Google Project Zero CVE-2014-4416 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4376 : Ian Beer of Google Project Zero

IOAcceleratorFamily Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4402 : Ian Beer of Google Project Zero

IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4379 : Ian Beer of Google Project Zero

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4388 : @PanguTeam

IOKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero

Kernel Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses. CVE-ID CVE-2014-4403 : Ian Beer of Google Project Zero

Libnotify Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking CVE-ID CVE-2014-4381 : Ian Beer of Google Project Zero

OpenSSL Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. CVE-ID CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

QT Media Foundation Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

ruby Available for: OS X Mavericks 10.9 to 10.9.4 Impact: A remote attacker may be able to cause arbitrary code execution Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6 CVE-ID CVE-2014-2525

Note: OS X Mavericks 10.9.5 includes the security content of Safari 7.0.6: http://support.apple.com/kb/HT6367

OS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/

Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJUGkP0AAoJEBcWfLTuOo7tygQP/1vHYXtWy6492Tjj6ycymWa+ Ct0eCCBU/AUi5ODNDeV9ddWkuFeXKbgQSHoPU19IPcIBAKnYUupVJSJ/cEHfSthh CiROjJw8Bt8comn04BgggHieLveN1xQCXQDcO29kBIpQr394XKS0lNXP//Z0oG5V sCnEDPz/0R92mwT5XkKD9WC7G/WjybS5V7BjEbdzDOn4qdTVje05xI5pof+fkeQ1 hFHo7uTCDkSzLH2YxrQHifNVyItz8AgnNHwH7zc6XmNtiNFkiFP/KU6BYyr8WiTQ Jb3pyLB/Xvmbd0kuETnDNvV0oJc88G38a++xZPnuM7zQrW/TQkkKQpiqKtYAiJuw ZhUoky620/7HULegcYtsTyuDFyEN6whdSmHLFCJzk2oZXZ7MPA8ywCFB8Y79rohW 5MTe/zVUSxxYBgVXpkmhPwXYSTINeUJGJA1RQtXhC2Hh6O2jeqJP2H0hTmgsCBRA 3X/2CGoyAAgoKTJwgXk07tBbJWf+wQwAvUN9L1Yph+uOvvUzqFt8LNEGw9jVPsZl QHcSEW/Ef/HK/OLwVZiPqse6lRJAdRZl5//vm4408jnXfJCy6KnvxcsO4Z1yTyoP kCXdWlSLBiidcRRWBfoQBSC3gANcx9a56ItWieEvJrdNOiyhb+gqEk7XraOlb/gf k4w2RKNm0Fv+kdNoFAnd =gpVc -----END PGP SIGNATURE-----

. OpenSSL is a 3rd party product that is embedded with some HP Software products. The bulletin does not apply to any other 3rd party application (e.g. operating system, web server, or application server) that may be required to be installed by the customer according instructions in the product install guide. ============================================================================ Ubuntu Security Notice USN-2232-4 August 18, 2014

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS

Summary:

USN-2232-1 introduced a regression in OpenSSL. One of the patch backports for Ubuntu 10.04 LTS caused a regression for certain applications. This update fixes the problem.

We apologize for the inconvenience. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0195) Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. (CVE-2014-0224) Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled anonymous ECDH ciphersuites. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-3470)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.21

After a standard system update you need to reboot your computer to make all the necessary changes.

CVE-2014-0221

Imre Rad discovered the processing of DTLS hello packets is 
susceptible to denial of service.

Additional information can be found at http://www.openssl.org/news/secadv_20140605.txt

For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u10. You can use the tool checkrestart from the package debian-goodies to detect affected programs or reboot your system. There's also a forthcoming security update for the Linux kernel later the day (CVE-2014-3153), so you need to reboot anyway. Perfect timing, isn't it?

For the unstable distribution (sid), these problems will be fixed soon. Corrected: 2014-06-05 12:32:38 UTC (stable/10, 10.0-STABLE) 2014-06-05 12:33:23 UTC (releng/10.0, 10.0-RELEASE-p5) 2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1) 2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1-p2) 2014-06-05 12:33:23 UTC (releng/9.2, 9.2-RELEASE-p8) 2014-06-05 12:33:23 UTC (releng/9.1, 9.1-RELEASE-p15) 2014-06-05 12:32:38 UTC (stable/8, 8.4-STABLE) 2014-06-05 12:33:23 UTC (releng/8.4, 8.4-RELEASE-p12) CVE Name: CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-3470]

III. [CVE-2014-3470]

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch.asc

gpg --verify openssl-10.patch.asc

[FreeBSD 9.x and 8.x]

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch

fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch.asc

gpg --verify openssl-9.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r267103 releng/8.4/ r267104 stable/9/ r267106 releng/9.1/ r267104 releng/9.2/ r267104 stable/10/ r267103 releng/10.0/ r267104


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII.

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug (CVE-2014-0160).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability (CVE-2014-0224).

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue became relevant after the CVE-2014-3568 fix (CVE-2014-3569).

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c (CVE-2014-3570).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message (CVE-2014-3572).

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c (CVE-2014-8275).

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations (CVE-2015-0204).

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support (CVE-2015-0205).

The updated packages have been upgraded to the 1.0.1m version where these security flaws has been fixed.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://openssl.org/news/secadv_20150108.txt http://openssl.org/news/secadv_20150319.txt


Updated Packages:

Mandriva Business Server 2/X86_64: 324a85f7e1165ab02881e44dbddaf599 mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm 9c0bfb6ebd43cb6d81872abf71b4f85f mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm 58df54e72ca7270210c7d8dd23df402b mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm b5313ffb5baaa65aea05eb05486d309a mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm a9890ce4c33630cb9e00f3b2910dd784 mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm 521297a5fe26e2de0c1222d8d03382d1 mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-libs/openssl < 1.0.1h-r1 >= 0.9.8z_p5 >= 0.9.8z_p4 >= 0.9.8z_p1 >= 0.9.8z_p3 >= 0.9.8z_p2 >= 1.0.0m >= 1.0.1h-r1

Description

Multiple vulnerabilities have been discovered in OpenSSL.

Resolution

All OpenSSL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1h-r1"

References

[ 1 ] CVE-2010-5298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298 [ 2 ] CVE-2014-0195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195 [ 3 ] CVE-2014-0198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198 [ 4 ] CVE-2014-0221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221 [ 5 ] CVE-2014-0224 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224 [ 6 ] CVE-2014-3470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470 [ 7 ] OpenSSL Security Advisory [05 Jun 2014] http://www.openssl.org/news/secadv_20140605.txt

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201407-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: openssl security update Advisory ID: RHSA-2014:0625-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0625.html Issue date: 2014-06-05 CVE Names: CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)

Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433

A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. (CVE-2014-0195)

Multiple flaws were found in the way OpenSSL handled read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or server using OpenSSL could crash or unexpectedly drop connections when processing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221)

A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)

Red Hat would like to thank the OpenSSL project for reporting these issues. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195, Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix Gröbert and Ivan Fratrić of Google as the original reporters of CVE-2014-3470.

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free 1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() 1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability 1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake 1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment 1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.14.ppc.rpm openssl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc.rpm openssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.14.s390.rpm openssl-1.0.1e-16.el6_5.14.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-devel-1.0.1e-16.el6_5.14.s390.rpm openssl-devel-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm openssl-static-1.0.1e-16.el6_5.14.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm openssl-perl-1.0.1e-16.el6_5.14.s390x.rpm openssl-static-1.0.1e-16.el6_5.14.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm openssl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.14.i686.rpm openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.14.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm openssl-perl-1.0.1e-16.el6_5.14.i686.rpm openssl-static-1.0.1e-16.el6_5.14.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2010-5298.html https://www.redhat.com/security/data/cve/CVE-2014-0195.html https://www.redhat.com/security/data/cve/CVE-2014-0198.html https://www.redhat.com/security/data/cve/CVE-2014-0221.html https://www.redhat.com/security/data/cve/CVE-2014-0224.html https://www.redhat.com/security/data/cve/CVE-2014-3470.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/articles/904433 https://access.redhat.com/site/solutions/905793

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB pJJhdOUzRUL8R2haDM4xrsk= =hZF8 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. These vulnerabilities include:

  • The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information.

  • HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5

  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5
  • HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2010-5298
  4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)

CVE-2014-0076
  4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVE-2014-0195
  7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-0198
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0221
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-0224
  6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-2014-3470
  5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-2014-3566
  3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-2016-0705
  9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE recommends applying the following software updates to resolve the vulnerabilities in the impacted versions of HPE StoreVirtual products running HPE LeftHand OS.

LeftHand OS v11.5 - Patches 45019-00 and 45020 LeftHand OS v12.0 - Patches 50016-00 and 50017-00 LeftHand OS v12.5 - Patch 55016-00 LeftHand OS v12.6 - Patch 56002-00

Notes:

These patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision to OpenSSL v1.0.1e 48. These patches migrate Certificate Authority Hashing Algorithm from a weak hashing algorithm SHA1 to the stronger hashing algorithm SHA256. The impacted products appear in the list below are vulnerable due to embedding of OpenSSL standard release software.

Release Date: 2014-08-08 Last Updated: 2014-08-08

Potential Security Impact: Remote denial of service (DoS), code execution, unauthorized access, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH), HP Smart Update Manager (SUM), and HP Version Control Agent (VCA) running on Linux and Windows. These components of HP Insight Control server deployment could be exploited remotely resulting in denial of service (DoS), code execution, unauthorized access, or disclosure of information.

HP Insight Control server deployment packages HP System Management Homepage (SMH) and HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and deploys them through the following components. This bulletin provides the information needed to update the HP Insight Control server deployment solution.

Install HP Management Agents for Windows x86/x64 Install HP Management Agents for RHEL 5 x64 Install HP Management Agents for RHEL 6 x64 Install HP Management Agents for SLES 10 x64 Install HP Management Agents for SLES 11 x64 Upgrade Proliant Firmware

References:

CVE-2010-5298 Remote Denial of Service CVE-2014-0076 Unauthorized Disclosure of Information CVE-2014-0195 Remote Unauthorized Access CVE-2014-0198 Remote Denial of Service CVE-2014-0221 Remote Denial of Service (DoS) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information CVE-2014-3470 Remote Code Execution or Unauthorized Access SSRT101628

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0076 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-0195 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0221 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following updates to v7.3.1 of HP Insight Control server deployment to resolve this vulnerability. HP has provided manual update steps if a version upgrade is not possible; if users wish to remain at v7.1.2, v7.2.0, or v7.2.1.

Note: It is important to check your current running version of HP Insight Control server deployment and to follow the correct steps listed below. For HP Insight Control server deployment v7.2.2, users must upgrade to v7.3.1 and follow the steps below to remove the vulnerability. The vulnerability known as Heartbleed (CVE-2014-0160) was fixed in HP Insight Control server deployment v7.3.1. That Security Bulletin with instructions on how to upgrade to v7.3.1 can be found here:

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_n a-c04267749

HP Insight Control server deployment users of v7.1.2, v7.2.0, v7.2.1 should take the following steps to remove this vulnerability.

Delete the files smhamd64-.exe/smhx86-.exe" from Component Copy Location listed in the following table, rows 1 and 2. Delete the files "vcax86-.exe/vcaamd64-.exe from Component Copy Location listed in the following table, rows 3 and 4. Delete the files hpsmh-7.*.rpm" from Component Copy Location listed in row 5. In sequence, perform the steps from left to right in the following table. First, download components from Download Link; Second, rename the component as suggested in Rename to. Third, copy the component to the location specified in Component Copy Location. Table Row Number Download Link Rename to Component Copy Location

1 http://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba smhamd64-ccp023716.exe \express\hpfeatures\hpagents-ws\components\Win2008

2 http://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05 smhx86-cp023715.exe \express\hpfeatures\hpagents-ws\components\Win2008

3 http://www.hp.com/swpublishing/MTX-8aefeaf490284a7691eca97d13 vcax86-cp023742.exe \express\hpfeatures\hpagents-ws\components\Win2008

4 http://www.hp.com/swpublishing/MTX-c0d32bac154a4d93839d8cd1f2 vcaamd64-cp023743.exe \express\hpfeatures\hpagents-ws\components\Win2008

5 http://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93 Do not rename the downloaded component for this step. \express\hpfeatures\hpagents-sles11-x64\components \express\hpfeatures\hpagents-sles10-x64\components \express\hpfeatures\hpagents-rhel5-x64\components \express\hpfeatures\hpagents-rhel6-x64\components

Download and extract the HPSUM 5.3.6 component from ftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p750586112/v99793

Copy all content from extracted ZIP folder and paste into \eXpress\hpfeatures\fw-proLiant\components Initiate Install HP Management Agents for SLES 11 x64 on targets running SLES11 x64. Initiate Install HP Management Agents for SLES 10 x64 on targets running SLES10 x64. Initiate Install HP Management Agents for RHEL 6 x64 on targets running RHEL 6 x64. Initiate Install HP Management Agents for RHEL 5 x64 on targets running RHEL 5 x64. Initiate Install HP Management Agents for Windows x86/x64 on targets running Windows.

HP Insight Control server deployment users with v7.2.2:

Please upgrade to Insight Control server deployment v7.3.1 and follow the steps below for v7.3.1.

HP Insight Control server deployment users with v7.3.1:

Perform steps 1 - 4 as outlined above for users with HP Insight Control server deployment v7.1.2, v7.2.0, and v7.2.1. Download the HP SUM ZIP file from http://www.hp.com/swpublishing/MTX-f6c141a7feeb4a358bbb28300f

Extract the contents from the HP SUM ZIP file to \eXpress\hpfeatures\fw-proLiant\components location on the Insight Control server deployment server

Related security bulletins:

For System Management Homepage please see Security bulletin HPSBMU03051 https ://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04 345210

For HP Version Control Agent please see Security bulletin HPSBMU03057 https:/ /h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c0434 9897

HISTORY Version:1 (rev.1) - 8 August 2014 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0137",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 1.1,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8za",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "13.2",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "19",
         },
         {
            model: "mariadb",
            scope: "gte",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.0",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 1,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "mariadb",
            scope: "lt",
            trust: 1,
            vendor: "mariadb",
            version: "10.0.13",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "20",
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "42.1",
         },
         {
            model: "openssl",
            scope: "gte",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "bladecenter advanced management module 3.66e",
            scope: null,
            trust: 0.9,
            vendor: "ibm",
            version: null,
         },
         {
            model: "fedora",
            scope: null,
            trust: 0.8,
            vendor: "fedora",
            version: null,
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "3.0 (ibm pureapplication system and  xen)",
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "3.0 (vmware)",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 10.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 10.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "standard/advanced edition 11.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "standard/advanced edition 11.3",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "patient hub 9.7",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 9.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "provider hub 9.7",
         },
         {
            model: "sdk,",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "for node.js 1.1.0.3",
         },
         {
            model: "smartcloud orchestrator",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "smartcloud orchestrator",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3 fp1",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.1 for ibm provided software virtual appliance",
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "2.3 fp1",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "4.1.1 (linux-ix86 and  linux-s390)",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.4.0 fp07",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.5.0 fp04",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.5.1 fp05",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 8.6.0 fp03",
         },
         {
            model: "tivoli workload scheduler",
            scope: "lte",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 9.1.0 fp01",
         },
         {
            model: "tivoli workload scheduler",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "distributed 9.2.0 ga level",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.2",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.3",
         },
         {
            model: "tivoli composite application manager",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "for transactions 7.4",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "0.9.8 thats all  0.9.8za",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.0 thats all  1.0.0m",
         },
         {
            model: "openssl",
            scope: "lt",
            trust: 0.8,
            vendor: "openssl",
            version: "1.0.1 thats all  1.0.1h",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.7.5",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.8.5",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.9 to  10.9.4",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 0.8,
            vendor: "apple",
            version: "10.7.5",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.63",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 4.71",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.0",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.8,
            vendor: "oracle",
            version: "of  oracle secure global desktop 5.1",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "3.2.24",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.0.26",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.1.34",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.2.26",
         },
         {
            model: "vm virtualbox",
            scope: "lt",
            trust: 0.8,
            vendor: "oracle",
            version: "4.3.14",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "6",
         },
         {
            model: "storage",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1",
         },
         {
            model: "l20/300",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "lto6 drive",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "lx/30a",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "integrated system ha database ready",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "symfoware",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "analytics server",
         },
         {
            model: "symfoware",
            scope: "eq",
            trust: 0.8,
            vendor: "fujitsu",
            version: "server",
         },
         {
            model: "openssl",
            scope: null,
            trust: 0.7,
            vendor: "openssl",
            version: null,
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 0.6,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.14",
         },
         {
            model: "security enterprise scanner",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.3",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.3",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "spa232d multi-line dect ata",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "policy center v100r003c00spc305",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "solaris",
            scope: "ne",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1.20.5.0",
         },
         {
            model: "proactive network operations center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.0.2",
         },
         {
            model: "project openssl 0.9.8f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "documentum content server p06",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "chrome for android",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.141",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8800",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "9.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.0d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "prime network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "ip video phone e20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2.6",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "ios software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "ios xe software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "mate products",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32400",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl b",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6.1",
         },
         {
            model: "computer telephony integration object server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "isoc v200r001c00spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.9",
         },
         {
            model: "10.0-release-p5",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "small business isa500 series integrated security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "srg1200&2200&3200 v100r002c02hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ace application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "project openssl k",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.28",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "systems insight manager 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "project openssl 1.0.0g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "56000",
         },
         {
            model: "anyconnect secure mobility client for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.3",
         },
         {
            model: "dsr-500n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "video surveillance series ip camera",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "anyconnect secure mobility client for desktop platforms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "idp 4.1r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "fortios b0537",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77009.7",
         },
         {
            model: "9.1-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg9500 usg9500 v300r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2750&s5700&s6700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "filenet system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "spa510 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace u19** v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "content security management appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.1",
         },
         {
            model: "uma v200r001c00spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "idp 4.1r3",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.5",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "usg9500 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smartcloud provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "vpn client v100r001c02spc702",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "telepresence content server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tandberg codian mse model",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83200",
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "uma v200r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "api management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "oceanstor s6800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8w",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "34.0",
         },
         {
            model: "isoc v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "3000",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "enterprise linux server eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "release-p4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "manageone v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1",
         },
         {
            model: "eupp v100r001c10spc002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime performance manager for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "tivoli workload scheduler distributed ga level",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "project openssl 0.9.8m",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "9.1-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl j",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "updatexpress system packs installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "s7700&s9700 v200r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.6",
         },
         {
            model: "prime access registrar appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "87100",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "stunnel",
            scope: "ne",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.02",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "tivoli netcool/system service monitor fp11",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "flex system fc5022",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "s3900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "ips",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "unified communications widgets click to call",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "agile controller v100r001c00spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace usm v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "softco v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "videoscape anyres live",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence t series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "tivoli netcool/system service monitor fp12",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "unified attendant console advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "smart update manager for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3.5",
         },
         {
            model: "mds switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.1",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "documentum content server p07",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "wag310g wireless-g adsl2+ gateway with voip",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.4",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.10",
         },
         {
            model: "telepresence tx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.2",
         },
         {
            model: "nexus switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "31640",
         },
         {
            model: "jabber for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.2",
         },
         {
            model: "fastsetup",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.11",
         },
         {
            model: "unified wireless ip phone series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29200",
         },
         {
            model: "messagesight server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "fusionsphere v100r003c10spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "telepresence advanced media gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.40",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32100",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6.0",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "11.1",
         },
         {
            model: "smc2.0 v100r002c01b025sp07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "s2700&s3700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 0.9.8r",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "espace cc v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ida pro",
            scope: "eq",
            trust: 0.3,
            vendor: "hex ray",
            version: "6.5",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "jabber for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-3",
         },
         {
            model: "usg5000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4",
         },
         {
            model: "project openssl 0.9.8n",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "prime optical for sps",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.2",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "isoc v200r001c01",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "malware analyzer g2",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "project openssl 0.9.8y",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "icewall sso agent option",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.02007",
         },
         {
            model: "project openssl beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "esight-ewl v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c91",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.4",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "asg2000 v100r001c10sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "manageone v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "wireless lan controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "smart call home",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "project openssl beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "tivoli netcool/system service monitor fp2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "s7700&s9700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "oic v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "s6900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "icewall sso dfw certd",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "spa300 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "vsm v200r002c00spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "ecns610 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "ucs b-series servers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "project openssl 0.9.8p",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "documentum content server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0.1025308",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "telepresence isdn link",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.4",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.99",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50003.4.2.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "tandberg codian isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32200",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.4",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.9",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "s5900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "documentum content server p05",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "oceanstor s6800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "jabber video for telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9",
         },
         {
            model: "fortios build",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.2.0589",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.5",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0",
         },
         {
            model: "documentum content server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "virtualization experience media engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli workload scheduler distributed fp05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "tivoli workload scheduler distributed fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "jabber im for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "77109.7",
         },
         {
            model: "project openssl 0.9.8m beta1",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "small cell factory recovery root filesystem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.99.4",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "quantum policy suite",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8q",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ftp server",
            scope: "eq",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "manageone v100r002c10 spc320",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "svn2200 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.4",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "s2750&s5700&s6700 v100r006",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.5.2.3",
         },
         {
            model: "messagesight server",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "safe profile",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "espace vtm v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "jabber software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-453",
         },
         {
            model: "spa122 ata with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.1",
         },
         {
            model: "tivoli netcool/system service monitor fp10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "advanced settings utility",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-467",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.0",
         },
         {
            model: "spa525 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "automation stratix",
            scope: "ne",
            trust: 0.3,
            vendor: "rockwell",
            version: "590015.6.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "advanced settings utility",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "eupp v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nexus series fabric extenders",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "20000",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8v",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.0",
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "intelligencecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "3.2",
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.2",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "algo audit and compliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "telepresence mxp series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3.2",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13000",
         },
         {
            model: "documentum content server p02",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.1",
         },
         {
            model: "espace u2980 v100r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "uma-db v2r1coospc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management hf6",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2.2",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.4",
         },
         {
            model: "identity service engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence exchange system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "usg9300 usg9300 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s12700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.12",
         },
         {
            model: "desktop collaboration experience dx650",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "automation stratix",
            scope: "eq",
            trust: 0.3,
            vendor: "rockwell",
            version: "59000",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "oceanstor s2200t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433511.5",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0",
         },
         {
            model: "smart analytics system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7600-",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.3",
         },
         {
            model: "espace u2990 v200r001c02",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "telepresence system series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "tivoli workload scheduler for applications fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "srg1200&2200&3200 v100r002c02spc800",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsr-1000n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "telepresence server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70100",
         },
         {
            model: "open source security information management",
            scope: "ne",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.10",
         },
         {
            model: "storevirtual hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.0",
         },
         {
            model: "svn5500 v200r001c01spc600",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "email security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "telepresence ip gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0.1055",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.0",
         },
         {
            model: "key",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "tivoli netcool/system service monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "jabber voice for android",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "onepk all-in-one vm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.7",
         },
         {
            model: "usg5000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "big-ip ltm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "idp 4.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.9",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "tivoli netcool/system service monitor fp13",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "hp-ux b.11.11",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "infosphere guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.1",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.00",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.8.0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7700",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.4",
         },
         {
            model: "cc v200r001c31",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "tivoli netcool/system service monitor fp6",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "s12700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s5900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.10",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10648",
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2",
         },
         {
            model: "xenmobile app controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "2.9",
         },
         {
            model: "esight v2r3c10spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.0",
         },
         {
            model: "software development kit",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "isoc v200r001c02",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.4",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.3",
         },
         {
            model: "security information and event management hf3",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1.4",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "project openssl 0.9.8l",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.6",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "icewall sso dfw r2",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "documentum content server sp2 p13",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "agent desktop for cisco unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "project openssl h",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "messaging secure gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.1",
         },
         {
            model: "s3900 v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "adaptive security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "ddos secure",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "0",
         },
         {
            model: "anyoffice emm",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "2.6.0601.0090",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0.0",
         },
         {
            model: "ddos secure",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: "5.14.1-1",
         },
         {
            model: "9.3-beta1-p2",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "s2750&s5700&s6700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.7.0",
         },
         {
            model: "video surveillance series ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "project openssl i",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.12",
         },
         {
            model: "vsm v200r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "ssl for openvms",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-476",
         },
         {
            model: "project openssl 1.0.0i",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "powervu d9190 comditional access manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 3tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "hp-ux b.11.23",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "malware analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "4.1.1",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "anyconnect secure mobility client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "usg9500 usg9500 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual china hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "softco v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server sp2 p14",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "s2750&s5700&s6700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "s2700&s3700 v100r006c05+v100r06h",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s6800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortiap",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "0",
         },
         {
            model: "tivoli workload scheduler for applications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "storevirtual 4tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "big-ip psm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "ecns600 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "telepresence mcu series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "jabber voice for iphone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "prime network services controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "asg2000 v100r001c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp 5.1r4",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "unified ip conference phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "88310",
         },
         {
            model: "project openssl 1.0.0e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "oic v100r001c00spc402",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "documentum content server",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "s7700&s9700 v200r005+v200r005hp0",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nac manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp17",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.6",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "project openssl a",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.8",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.5",
         },
         {
            model: "business server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "1x8664",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.7",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "dsr-1000 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "project openssl c",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.13",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.4",
         },
         {
            model: "big-ip afm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8x",
         },
         {
            model: "vtm v100r001c30",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "logcenter v200r003c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "dynamic system analysis",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.61",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "tivoli workload scheduler distributed",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99510",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.0",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89450",
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "telepresence supervisor mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "80500",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.2.0.9",
         },
         {
            model: "puredata system for operational analytics a1791",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "0",
         },
         {
            model: "usg2000 v300r001c10sph201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dsm v100r002c05spc615",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "icewall sso dfw",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "10.0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "espace u2980 v100r001 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "project openssl 0.9.8t",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cloudburst",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.0",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "tivoli netcool/system service monitor fp8",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip asm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.00",
         },
         {
            model: "service delivery manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.2",
         },
         {
            model: "enterprise content management system monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "storevirtual 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.6",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "hosted collaboration mediation fulfillment",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s7700&s9700 v200r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns600 v100r002c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "application networking manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "icewall sso certd r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "oceanstor s2600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u19** v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.2",
         },
         {
            model: "spa500 series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tivoli workload scheduler distributed fp03",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "universal small cell series software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70003.4.20",
         },
         {
            model: "project openssl 1.0.1h",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual vsa software",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "12.5",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.5",
         },
         {
            model: "oceanstor s5600t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "ace application control engine module ace20",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "jabber for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloud manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.1.5.2",
         },
         {
            model: "storevirtual china hybrid san solution",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.1880",
         },
         {
            model: "hyperdp oceanstor n8500 v200r001c09",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.9.3",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.10",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0.2354",
         },
         {
            model: "agent desktop for cisco unified contact center",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "toolscenter suite",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "9.53",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "telepresence ip vcr series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11000",
         },
         {
            model: "unified communications series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "telepresence sx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "8.4-release-p12",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "netcool/system service monitor fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.014",
         },
         {
            model: "hyperdp v200r001c91spc201",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "4.1",
         },
         {
            model: "unified attendant console",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "dsr-500 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "99710",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "project openssl d",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "s3900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "documentum content server sp1 p26",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "18.0",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.6",
         },
         {
            model: "security information and event management hf11",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3.2",
         },
         {
            model: "tivoli netcool/system service monitor fp4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "ftp server",
            scope: "ne",
            trust: 0.3,
            vendor: "cerberus",
            version: "7.0.0.3",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "project openssl 1.0.0j",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "eupp v100r001c01spc101",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ace application control engine module ace10",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 1.0.0b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "ecns600 v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 600gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.6",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "oceanstor s2600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ssl for openvms",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.4-471",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.3",
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.1.2",
         },
         {
            model: "smartcloud entry",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.2",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "3.1.12",
         },
         {
            model: "tivoli netcool/system service monitor fp9",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "tivoli workload scheduler distributed fp07",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "smart update manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3.1",
         },
         {
            model: "manageone v100r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hp-ux b.11.31",
            scope: null,
            trust: 0.3,
            vendor: "hp",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463011.5",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.0",
         },
         {
            model: "ave2000 v100r001c00sph001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "security information and event management ga",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.4.0",
         },
         {
            model: "svn2200 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "esight-ewl v300r001c10spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ave2000 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0",
         },
         {
            model: "project openssl f",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "usg9500 v300r001c01spc300",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "tivoli netcool/system service monitor fp5",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "fortios b064",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-1",
         },
         {
            model: "documentum content server sp2 p15",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "usg9500 v300r001c20sph102",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tivoli workload scheduler for applications fp01",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "big-ip link controller",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "storevirtual 1tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "fortios",
            scope: "ne",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.8",
         },
         {
            model: "asa cx context-aware security",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli workload scheduler distributed fp02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "telepresence integrator c series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.4.13",
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.5",
         },
         {
            model: "unified im and presence services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "usg9300 v200r001c01sph902",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "elog v100r003c01spc503",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "anyoffice v200r002c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "463012.5",
         },
         {
            model: "nac appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: "digital media players series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "hardware management console release",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v77.6",
         },
         {
            model: "vpn client v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence server on multiparty media",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3100",
         },
         {
            model: "metro ethernet series access devices",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12000",
         },
         {
            model: "storevirtual 1tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "s5900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "13.10",
         },
         {
            model: "prime network",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s6900 v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ecns610 v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.0.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.5",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453012.6",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "storevirtual fc 900gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1.0",
         },
         {
            model: "storevirtual 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.5",
         },
         {
            model: "9.2-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "fusionsphere v100r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "usg9500 usg9500 v300r001c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "tsm v100r002c07spc219",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace u2990 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "prime infrastructure",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "protection service for email",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "7.5",
         },
         {
            model: "espace iad v300r002c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "ace application control engine appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "documentum content server sp1 p28",
            scope: "eq",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "telepresence isdn gw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "32410",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.2.3",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.5",
         },
         {
            model: "stunnel",
            scope: "eq",
            trust: 0.3,
            vendor: "stunnel",
            version: "5.01",
         },
         {
            model: "oceanstor s5600t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "espace iad v300r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.6",
         },
         {
            model: "telepresence ex series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473011.5",
         },
         {
            model: "telepresence server on virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "oceanstor s6800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "manageone v100r001c02 spc901",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security information and event management",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.5-2",
         },
         {
            model: "tivoli network manager ip edition fix pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.94",
         },
         {
            model: "project openssl 1.0.0m",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.0",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "oceanstor s2600t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "dsr-500n rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "s2750&s5700&s6700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5800t v100r005",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "11.00",
         },
         {
            model: "oceanstor s5800t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "psb email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "9.20",
         },
         {
            model: "isoc v200r001c02spc202",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "9000",
         },
         {
            model: "ios xr software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 2tb mdl sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip apm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.4.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413011.5",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "79000",
         },
         {
            model: "ons series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "154000",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "tivoli netcool/system service monitor fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "unified intelligent contact management enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nip2000&5000 v100r002c10spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "hyperdp v200r001c09spc501",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "icewall sso dfw r3",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
         {
            model: "release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.2",
         },
         {
            model: "anyconnect secure mobility client for ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.166",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "eupp v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "fortios",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "5.0",
         },
         {
            model: "toolscenter suite",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.52",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "dsr-500 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.0.3",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1.0",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "2.1.2",
         },
         {
            model: "policy center v100r003c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "project openssl 0.9.8o",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "telepresence",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "13100",
         },
         {
            model: "project openssl e",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "0.9.8",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "project openssl 1.0.0k",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "director",
            scope: "eq",
            trust: 0.3,
            vendor: "bluecoat",
            version: "5.4",
         },
         {
            model: "storevirtual 3tb mdl sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "tandberg mxp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9900",
         },
         {
            model: "updatexpress system packs installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "oceanstor s5800t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip wom",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.1",
         },
         {
            model: "jabber for mac",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "usg2000 v300r001c10spc200",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "d9036 modular encoding platform",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "video surveillance 4300e/4500e high-definition ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smart update manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "6.4.1",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.92743",
         },
         {
            model: "unified series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "69000",
         },
         {
            model: "tivoli netcool/system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "453011.5",
         },
         {
            model: "oceanstor s5600t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli netcool/system service monitor fp7",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6.7",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "473012.0",
         },
         {
            model: "jabber video for ipad",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "guardium database activity monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.2",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.8.5",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "31.0.1650.59",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "operations analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.1",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "video surveillance ptz ip cameras",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2",
         },
         {
            model: "project openssl 0.9.8s",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "webex connect client for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "telepresence serial gateway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "elog v100r003c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "security module for cisco network registar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ata series analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.2.1",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "4.6",
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89610",
         },
         {
            model: "cognos planning fp3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "storevirtual fc 900gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "project openssl 0.9.8za",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "blackberry enterprise service",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.2.0",
         },
         {
            model: "storevirtual 450gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-320",
         },
         {
            model: "chrome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "35.0",
         },
         {
            model: "storevirtual hybrid storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433512.6",
         },
         {
            model: "email and server security",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "10.00",
         },
         {
            model: "unified contact center express",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "softco v200r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "9.2-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "storevirtual 450gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.7.5",
         },
         {
            model: "big-ip gtm",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "s6900 v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0.00",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "svn5500 v200r001c01hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "project openssl beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.6",
         },
         {
            model: "prime lan management solution",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "epolicy orchestrator",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "9.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.4-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "agent desktop for cisco unified contact center enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "dsm v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "agile controller v100r001c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nip2000&5000 v100r002c10hp0001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "telepresence mx series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "tapi service provider",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "infosphere master data management",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "storevirtual 1tb mdl china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433012.0",
         },
         {
            model: "tivoli workload scheduler distributed fp04",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1",
         },
         {
            model: "telepresence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "500-370",
         },
         {
            model: "oceanstor s5800t v100r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "oceanstor s5500t v100r002",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "css series content services switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "115000",
         },
         {
            model: "blackberry os",
            scope: "eq",
            trust: 0.3,
            vendor: "rim",
            version: "10.0.10",
         },
         {
            model: "telepresence isdn gw mse",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "83210",
         },
         {
            model: "ucs central",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "telepresence profile series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "smc2.0 v100r002c01b017sp16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "web gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.3.2.10",
         },
         {
            model: "espace iad v300r001c07",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "storevirtual 900gb sas storage/s-buy",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "dynamic system analysis",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.60",
         },
         {
            model: "icewall mcrp",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "s7700&s9700 v200r003",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "storevirtual 600gb sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "413012.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.2.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "open source security information management",
            scope: "eq",
            trust: 0.3,
            vendor: "alienvault",
            version: "1.0.6",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.3",
         },
         {
            model: "freedome for android",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "0",
         },
         {
            model: "fortios b0630",
            scope: "eq",
            trust: 0.3,
            vendor: "fortinet",
            version: "4.3.8",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "physical access gateways",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "storevirtual 450gb china sas storage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "433011.5",
         },
         {
            model: "dsr-1000 rev. a1",
            scope: null,
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "nac guest server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "session border controller enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "s7700&s9700 v200r001",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "dsr-1000n 1.09.b61",
            scope: "ne",
            trust: 0.3,
            vendor: "d link",
            version: null,
         },
         {
            model: "unified ip phone",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "89410",
         },
         {
            model: "9.3-beta1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "unity connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "project openssl 0.9.8u",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "isoc v200r001c01spc101",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "5000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "idp",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "5.1",
         },
         {
            model: "big-ip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.1",
         },
         {
            model: "documentum content server sp2 p16",
            scope: "ne",
            trust: 0.3,
            vendor: "emc",
            version: "6.7",
         },
         {
            model: "oceanstor s2200t v100r005c30spc100",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "prime network registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "espace usm v100r001c01",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "project openssl 1.0.0a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "icewall sso dfw r1",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "BID",
            id: "67900",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:fedoraproject:fedora",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:api_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:infosphere_master_data_management",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:initiate_master_data_service",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:java_sdk",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:smartcloud_orchestrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:smartcloud_provisioning",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_management_framework",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_workload_scheduler",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:tivoli_composite_application_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:openssl:openssl",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:apple:mac_os_x_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:virtualization_secure_global_desktop",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:oracle:vm_virtualbox",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:redhat:storage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:l20_300",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:lto6_drive",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:hitachi:lx_30a",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:integrated_system_ha_database_ready",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:symfoware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Jüri Aedla",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2014-0195",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-0195",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "ZDI",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2014-0195",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "HIGH",
                  trust: 0.7,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-0195",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2014-0195",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "ZDI",
                  id: "CVE-2014-0195",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201406-078",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-0195",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DTLS packets.  The issue lies in the assumption that all fragments specify the same message size.  An attacker could leverage this vulnerability to execute code in the context of the process using OpenSSL. \nThe following are vulnerable:\nOpenSSL 0.9.8 prior to 0.9.8za\nOpenSSL 1.0.0 prior to 1.0.0m\nOpenSSL 1.0.1 prior to 1.0.1h. This\nupdate addresses the issues by updating PHP to version 5.4.30\nCVE-ID\nCVE-2013-7345\nCVE-2014-0185\nCVE-2014-0207\nCVE-2014-0237\nCVE-2014-0238\nCVE-2014-1943\nCVE-2014-2270\nCVE-2014-3478\nCVE-2014-3479\nCVE-2014-3480\nCVE-2014-3487\nCVE-2014-3515\nCVE-2014-3981\nCVE-2014-4049\n\nBluetooth\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of a\nBluetooth API call. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4390 : Ian Beer of Google Project Zero\n\nCoreGraphics\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or an information disclosure\nDescription:  An out of bounds memory read existed in the handling of\nPDF files. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nCoreGraphics\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  An integer overflow existed in the handling of PDF\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with\nthe iSIGHT Partners GVP Program\n\nFoundation\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  An application using NSXMLParser may be misused to disclose\ninformation\nDescription:  An XML External Entity issue existed in NSXMLParser's\nhandling of XML. This issue was addressed by not loading external\nentities across origins. \nCVE-ID\nCVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  Compiling untrusted GLSL shaders may lead to an unexpected\napplication termination or arbitrary code execution\nDescription:  A user-space buffer overflow existed in the shader\ncompiler. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4393 : Apple\n\nIntel Graphics Driver\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  Multiple validation issues existed in some integrated\ngraphics driver routines. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4394 : Ian Beer of Google Project Zero\nCVE-2014-4395 : Ian Beer of Google Project Zero\nCVE-2014-4396 : Ian Beer of Google Project Zero\nCVE-2014-4397 : Ian Beer of Google Project Zero\nCVE-2014-4398 : Ian Beer of Google Project Zero\nCVE-2014-4399 : Ian Beer of Google Project Zero\nCVE-2014-4400 : Ian Beer of Google Project Zero\nCVE-2014-4401 : Ian Beer of Google Project Zero\nCVE-2014-4416 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A null pointer dereference existed in the handling of\nIOKit API arguments. This issue was addressed through improved\nvalidation of IOKit API arguments. \nCVE-ID\nCVE-2014-4376 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOAcceleratorFamily function. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4402 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can read kernel pointers, which can be used to\nbypass kernel address space layout randomization\nDescription:  An out-of-bounds read issue existed in the handling of\nan IOHIDFamily function. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-4379 : Ian Beer of Google Project Zero\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  A validation issue existed in the handling of certain\nmetadata fields of IODataQueue objects. This issue was addressed\nthrough improved validation of metadata. \nCVE-ID\nCVE-2014-4388 : @PanguTeam\n\nIOKit\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription:  An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4389 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A local user can infer kernel addresses and bypass kernel\naddress space layout randomization\nDescription:  In some cases, the CPU Global Descriptor Table was\nallocated at a predictable address. This issue was addressed through\nalways allocating the Global Descriptor Table at random addresses. \nCVE-ID\nCVE-2014-4403 : Ian Beer of Google Project Zero\n\nLibnotify\nAvailable for:  OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 to 10.9.4\nImpact:  A malicious application may be able to execute arbitrary\ncode with root privileges\nDescription:  An out-of-bounds write issue existed in Libnotify. This\nissue was addressed through improved bounds checking\nCVE-ID\nCVE-2014-4381 : Ian Beer of Google Project Zero\n\nOpenSSL\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Multiple vulnerabilities in OpenSSL 0.9.8y, including one\nthat may lead to arbitrary code execution\nDescription:  Multiple vulnerabilities existed in OpenSSL 0.9.8y. \nCVE-ID\nCVE-2014-0076\nCVE-2014-0195\nCVE-2014-0221\nCVE-2014-0224\nCVE-2014-3470\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nRLE encoded movie files. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom\nGallagher & Paul Bates working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted MIDI file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A buffer overflow existed in the handling of MIDI\nfiles. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative\n\nQT Media Foundation\nAvailable for:  OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 to 10.9.4\nImpact:  Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription:  A memory corruption issue existed in the handling of\nthe 'mvhd' atoms. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day\nInitiative\n\nruby\nAvailable for:  OS X Mavericks 10.9 to 10.9.4\nImpact:  A remote attacker may be able to cause arbitrary code\nexecution\nDescription:  A heap buffer overflow existed in LibYAML's handling of\npercent-encoded characters in a URI. This issue was addressed through\nimproved bounds checking. This update addresses the issues by\nupdating LibYAML to version 0.1.6\nCVE-ID\nCVE-2014-2525\n\n\nNote: OS X Mavericks 10.9.5 includes the security content of\nSafari 7.0.6: http://support.apple.com/kb/HT6367\n\nOS X Mavericks v10.9.5 and Security Update 2014-004 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nk4w2RKNm0Fv+kdNoFAnd\n=gpVc\n-----END PGP SIGNATURE-----\n\n. \nOpenSSL is a 3rd party product that is embedded with some HP Software\nproducts. The bulletin does not apply to any other 3rd party application\n(e.g. operating system, web server, or application server) that may be\nrequired to be installed by the customer according instructions in the\nproduct install guide. ============================================================================\nUbuntu Security Notice USN-2232-4\nAugust 18, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 10.04 LTS\n\nSummary:\n\nUSN-2232-1 introduced a regression in OpenSSL. One of the patch backports for\nUbuntu 10.04 LTS caused a regression for certain applications. This update\nfixes the problem. \n\nWe apologize for the inconvenience. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\n Ubuntu 14.04 LTS. (CVE-2014-0195)\n  Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. \n (CVE-2014-0224)\n  Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled\n anonymous ECDH ciphersuites. This issue only\n affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. \n (CVE-2014-3470)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 10.04 LTS:\n  libssl0.9.8                     0.9.8k-7ubuntu8.21\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nCVE-2014-0221\n\n    Imre Rad discovered the processing of DTLS hello packets is \n    susceptible to denial of service. \n\nAdditional information can be found at \nhttp://www.openssl.org/news/secadv_20140605.txt\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1.0.1e-2+deb7u10. You can use the tool checkrestart from the package\ndebian-goodies to detect affected programs or reboot your system. There's\nalso a forthcoming security update for the Linux kernel later the day\n(CVE-2014-3153), so you need to reboot anyway. Perfect timing, isn't it?\n\nFor the unstable distribution (sid), these problems will be fixed soon. \nCorrected:      2014-06-05 12:32:38 UTC (stable/10, 10.0-STABLE)\n                2014-06-05 12:33:23 UTC (releng/10.0, 10.0-RELEASE-p5)\n                2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1)\n                2014-06-05 12:53:06 UTC (stable/9, 9.3-BETA1-p2)\n                2014-06-05 12:33:23 UTC (releng/9.2, 9.2-RELEASE-p8)\n                2014-06-05 12:33:23 UTC (releng/9.1, 9.1-RELEASE-p15)\n                2014-06-05 12:32:38 UTC (stable/8, 8.4-STABLE)\n                2014-06-05 12:33:23 UTC (releng/8.4, 8.4-RELEASE-p12)\nCVE Name:       CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-3470]\n\nIII.  [CVE-2014-3470]\n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-10.patch.asc\n# gpg --verify openssl-10.patch.asc\n\n[FreeBSD 9.x and 8.x]\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:14/openssl-9.patch.asc\n# gpg --verify openssl-9.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r267103\nreleng/8.4/                                                       r267104\nstable/9/                                                         r267106\nreleng/9.1/                                                       r267104\nreleng/9.2/                                                       r267104\nstable/10/                                                        r267103\nreleng/10.0/                                                      r267104\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. \n \n The Montgomery ladder implementation in OpenSSL through 1.0.0l does\n not ensure that certain swap operations have a constant-time behavior,\n which makes it easier for local users to obtain ECDSA nonces via a\n FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). \n \n The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before\n 1.0.1g do not properly handle Heartbeat Extension packets, which allows\n remote attackers to obtain sensitive information from process memory\n via crafted packets that trigger a buffer over-read, as demonstrated\n by reading private keys, related to d1_both.c and t1_lib.c, aka the\n Heartbleed bug (CVE-2014-0160). \n \n OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before\n 1.0.1h does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications,\n and consequently hijack sessions or obtain sensitive information,\n via a crafted TLS handshake, aka the CCS Injection vulnerability\n (CVE-2014-0224). \n \n The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other\n products, uses nondeterministic CBC padding, which makes it easier\n for man-in-the-middle attackers to obtain cleartext data via a\n padding-oracle attack, aka the POODLE issue (CVE-2014-3566). NOTE: this issue\n became relevant after the CVE-2014-3568 fix (CVE-2014-3569). \n \n The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before\n 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square\n of a BIGNUM value, which might make it easier for remote attackers to\n defeat cryptographic protection mechanisms via unspecified vectors,\n related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and\n crypto/bn/bn_asm.c (CVE-2014-3570). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote\n SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger\n a loss of forward secrecy by omitting the ServerKeyExchange message\n (CVE-2014-3572). \n \n OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k\n does not enforce certain constraints on certificate data, which allows\n remote attackers to defeat a fingerprint-based certificate-blacklist\n protection mechanism by including crafted data within a\n certificate&#039;s unsigned portion, related to crypto/asn1/a_verify.c,\n crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c\n (CVE-2014-8275). \n \n The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before\n 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL\n servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate\n brute-force decryption by offering a weak ephemeral RSA key in a\n noncompliant role, related to the FREAK issue. NOTE: the scope of\n this CVE is only client code based on OpenSSL, not EXPORT_RSA issues\n associated with servers or other TLS implementations (CVE-2015-0204). \n \n The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before\n 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a\n Diffie-Hellman (DH) certificate without requiring a CertificateVerify\n message, which allows remote attackers to obtain access without\n knowledge of a private key via crafted TLS Handshake Protocol traffic\n to a server that recognizes a Certification Authority with DH support\n (CVE-2015-0205). \n \n The updated packages have been upgraded to the 1.0.1m version where\n these security flaws has been fixed. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293\n http://openssl.org/news/secadv_20150108.txt\n http://openssl.org/news/secadv_20150319.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n 324a85f7e1165ab02881e44dbddaf599  mbs2/x86_64/lib64openssl1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n 9c0bfb6ebd43cb6d81872abf71b4f85f  mbs2/x86_64/lib64openssl-devel-1.0.1m-1.mbs2.x86_64.rpm\n 58df54e72ca7270210c7d8dd23df402b  mbs2/x86_64/lib64openssl-engines1.0.0-1.0.1m-1.mbs2.x86_64.rpm\n b5313ffb5baaa65aea05eb05486d309a  mbs2/x86_64/lib64openssl-static-devel-1.0.1m-1.mbs2.x86_64.rpm\n a9890ce4c33630cb9e00f3b2910dd784  mbs2/x86_64/openssl-1.0.1m-1.mbs2.x86_64.rpm \n 521297a5fe26e2de0c1222d8d03382d1  mbs2/SRPMS/openssl-1.0.1m-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-libs/openssl           < 1.0.1h-r1             *>= 0.9.8z_p5\n                                                        *>= 0.9.8z_p4\n                                                        *>= 0.9.8z_p1\n                                                        *>= 0.9.8z_p3\n                                                        *>= 0.9.8z_p2\n                                                           *>= 1.0.0m\n                                                         >= 1.0.1h-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1h-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-5298\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298\n[ 2 ] CVE-2014-0195\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195\n[ 3 ] CVE-2014-0198\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198\n[ 4 ] CVE-2014-0221\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221\n[ 5 ] CVE-2014-0224\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224\n[ 6 ] CVE-2014-3470\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470\n[ 7 ] OpenSSL Security Advisory [05 Jun 2014]\n      http://www.openssl.org/news/secadv_20140605.txt\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201407-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: openssl security update\nAdvisory ID:       RHSA-2014:0625-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0625.html\nIssue date:        2014-06-05\nCVE Names:         CVE-2010-5298 CVE-2014-0195 CVE-2014-0198 \n                   CVE-2014-0221 CVE-2014-0224 CVE-2014-3470 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues. \nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGröbert and Ivan Fratrić of Google as the original reporters of\nCVE-2014-3470. \n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free\n1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake\n1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment\n1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.14.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.14.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.14.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.14.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-5298.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0195.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0198.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0221.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0224.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3470.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/site/articles/904433\nhttps://access.redhat.com/site/solutions/905793\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTkGAKXlSAg2UNWIIRAnrwAJ9sLrj3wCAZhJU00jxgt03unDAHywCfVjUB\npJJhdOUzRUL8R2haDM4xrsk=\n=hZF8\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. These vulnerabilities include: \n\n* The SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"POODLE\", which could be exploited remotely\nresulting in disclosure of information. \n\n  - HP StoreVirtual VSA Software 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4130 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 1TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB China SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4330 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 China Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid SAN Solution 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4335 Hybrid Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 2TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 3TB MDL SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 450GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 4TB MDL SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4530 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4630 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 600GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 900GB SAS Storage/S-Buy 12.6, 12.5, 12.0, 11.5\n  - HP StoreVirtual 4730 FC 900GB SAS Storage 12.6, 12.5, 12.0, 11.5\n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2010-5298\n      4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\n      4.0 (AV:N/AC:H/Au:N/C:N/I:P/A:P)\n\n    CVE-2014-0076\n      4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n      1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2014-0195\n      7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-0198\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0221\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-0224\n      6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n      6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n    CVE-2014-3470\n      5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n      4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n    CVE-2014-3566\n      3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\n      4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n    CVE-2016-0705\n      9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n      10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE recommends applying the following software updates to resolve the\nvulnerabilities in the impacted versions of HPE StoreVirtual products running\nHPE LeftHand OS. \n\nLeftHand OS v11.5 - Patches 45019-00 and 45020 \nLeftHand OS v12.0 - Patches 50016-00 and 50017-00 \nLeftHand OS v12.5 - Patch 55016-00 \nLeftHand OS v12.6 - Patch 56002-00 \n\n**Notes:**\n\nThese patches enable TLSv1.2 protocol and upgrades the OpenSSL RPM revision\nto OpenSSL v1.0.1e 48. \nThese patches migrate Certificate Authority Hashing Algorithm from a weak\nhashing algorithm SHA1 to the stronger hashing algorithm SHA256. The impacted products\nappear in the list below are vulnerable due to embedding of OpenSSL standard\nrelease software. \n\nRelease Date: 2014-08-08\nLast Updated: 2014-08-08\n\nPotential Security Impact: Remote denial of service (DoS), code execution,\nunauthorized access, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH), HP Smart Update Manager (SUM), and HP Version\nControl Agent (VCA) running on Linux and Windows. These components of HP\nInsight Control server deployment could be exploited remotely resulting in\ndenial of service (DoS), code execution, unauthorized access, or disclosure\nof information. \n\nHP Insight Control server deployment packages HP System Management Homepage\n(SMH) and HP Version Control Agent (VCA), and HP Smart Update Manager (SUM)\nand deploys them through the following components. This bulletin provides the\ninformation needed to update the HP Insight Control server deployment\nsolution. \n\nInstall HP Management Agents for Windows x86/x64\nInstall HP Management Agents for RHEL 5 x64\nInstall HP Management Agents for RHEL 6 x64\nInstall HP Management Agents for SLES 10 x64\nInstall HP Management Agents for SLES 11 x64\nUpgrade Proliant Firmware\n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service\nCVE-2014-0076 Unauthorized Disclosure of Information\nCVE-2014-0195 Remote Unauthorized Access\nCVE-2014-0198 Remote Denial of Service\nCVE-2014-0221 Remote Denial of Service (DoS)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nCVE-2014-3470 Remote Code Execution or Unauthorized Access\nSSRT101628\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2010-5298    (AV:N/AC:H/Au:N/C:N/I:P/A:P)       4.0\nCVE-2014-0076    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2014-0195    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-0198    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0221    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3470    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to v7.3.1 of HP Insight Control server\ndeployment to resolve this vulnerability. HP has provided manual update steps\nif a version upgrade is not possible; if users wish to remain at v7.1.2,\nv7.2.0, or v7.2.1. \n\nNote: It is important to check your current running version of HP Insight\nControl server deployment and to follow the correct steps listed below. For\nHP Insight Control server deployment v7.2.2, users must upgrade to v7.3.1 and\nfollow the steps below to remove the vulnerability. The vulnerability known\nas Heartbleed (CVE-2014-0160) was fixed in HP Insight Control server\ndeployment v7.3.1. That Security Bulletin with instructions on how to upgrade\nto v7.3.1 can be found here:\n\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_n\na-c04267749\n\nHP Insight Control server deployment users of v7.1.2, v7.2.0, v7.2.1 should\ntake the following steps to remove this vulnerability. \n\nDelete the files smhamd64-*.exe/smhx86-*.exe\" from Component Copy Location\nlisted in the following table, rows 1 and 2. \nDelete the files \"vcax86-*.exe/vcaamd64-*.exe from Component Copy Location\nlisted in the following table, rows 3 and 4. \nDelete the files hpsmh-7.*.rpm\" from Component Copy Location listed in row 5. \nIn sequence, perform the steps from left to right in the following table. \nFirst, download components from Download Link; Second, rename the component\nas suggested in Rename to. Third, copy the component to the location\nspecified in Component Copy Location. \nTable Row Number\n Download Link\n Rename to\n Component Copy Location\n\n1\n http://www.hp.com/swpublishing/MTX-e8076c2a35804685ad65b2b1ba\n smhamd64-ccp023716.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n2\n http://www.hp.com/swpublishing/MTX-3395d737d98f42149125b9bb05\n smhx86-cp023715.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n3\n http://www.hp.com/swpublishing/MTX-8aefeaf490284a7691eca97d13\n vcax86-cp023742.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n4\n http://www.hp.com/swpublishing/MTX-c0d32bac154a4d93839d8cd1f2\n vcaamd64-cp023743.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n5\n http://www.hp.com/swpublishing/MTX-bd9a1cf60e344c549c4888db93\n Do not rename the downloaded component for this step. \n \\\\express\\hpfeatures\\hpagents-sles11-x64\\components\n\\\\express\\hpfeatures\\hpagents-sles10-x64\\components\n\\\\express\\hpfeatures\\hpagents-rhel5-x64\\components\n\\\\express\\hpfeatures\\hpagents-rhel6-x64\\components\n\nDownload and extract the HPSUM 5.3.6 component from\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p750586112/v99793\n\nCopy all content from extracted ZIP folder and paste into\n\\\\eXpress\\hpfeatures\\fw-proLiant\\components\nInitiate Install HP Management Agents for SLES 11 x64 on targets running\nSLES11 x64. \nInitiate Install HP Management Agents for SLES 10 x64 on targets running\nSLES10 x64. \nInitiate Install HP Management Agents for RHEL 6 x64 on targets running RHEL\n6 x64. \nInitiate Install HP Management Agents for RHEL 5 x64 on targets running RHEL\n5 x64. \nInitiate Install HP Management Agents for Windows x86/x64 on targets running\nWindows. \n\nHP Insight Control server deployment users with v7.2.2:\n\nPlease upgrade to Insight Control server deployment v7.3.1 and follow the\nsteps below for v7.3.1. \n\nHP Insight Control server deployment users with v7.3.1:\n\nPerform steps 1 - 4 as outlined above for users with HP Insight Control\nserver deployment v7.1.2, v7.2.0, and v7.2.1. \nDownload the HP SUM ZIP file from\nhttp://www.hp.com/swpublishing/MTX-f6c141a7feeb4a358bbb28300f\n\nExtract the contents from the HP SUM ZIP file to\n\\\\eXpress\\hpfeatures\\fw-proLiant\\components location on the Insight Control\nserver deployment server\n\nRelated security bulletins:\n\nFor System Management Homepage please see Security bulletin HPSBMU03051 https\n://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04\n345210\n\nFor HP Version Control Agent please see Security bulletin HPSBMU03057 https:/\n/h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c0434\n9897\n\nHISTORY\nVersion:1 (rev.1) - 8 August 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "BID",
            id: "67900",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "PACKETSTORM",
            id: "127807",
         },
      ],
      trust: 3.78,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-0195",
            trust: 4.8,
         },
         {
            db: "ZDI",
            id: "ZDI-14-173",
            trust: 2.1,
         },
         {
            db: "BID",
            id: "67900",
            trust: 2,
         },
         {
            db: "MCAFEE",
            id: "SB10075",
            trust: 2,
         },
         {
            db: "SECUNIA",
            id: "59659",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58977",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59310",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59305",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59189",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59721",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59587",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58337",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59491",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59300",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "60571",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59287",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58939",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59162",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58743",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59449",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59364",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59990",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59192",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58945",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59126",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "61254",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59175",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59655",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59451",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59429",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59040",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59306",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59518",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58660",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59530",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59490",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59666",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59514",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59784",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58615",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59188",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59413",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58713",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58883",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "58714",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59365",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59441",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59223",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59454",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59450",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59301",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59895",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59342",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59669",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59437",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "59528",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1030337",
            trust: 1.7,
         },
         {
            db: "JUNIPER",
            id: "JSA10629",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU93868849",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-2304",
            trust: 0.7,
         },
         {
            db: "LENOVO",
            id: "LEN-24443",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-17-094-04",
            trust: 0.4,
         },
         {
            db: "DLINK",
            id: "SAP10045",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128315",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127421",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127917",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126937",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126957",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127807",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131044",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127630",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126927",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "140720",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127326",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127403",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "126925",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "BID",
            id: "67900",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "127807",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   id: "VAR-201406-0137",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4114296536842106,
   },
   last_update_date: "2024-11-29T21:15:41.756000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "DTLS invalid fragment vulnerability (CVE-2014-0195)",
            trust: 1.5,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            title: "HT6443",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT6443",
         },
         {
            title: "HT6443",
            trust: 0.8,
            url: "http://support.apple.com/kb/HT6443?viewlocale=ja_JP",
         },
         {
            title: "KB36051",
            trust: 0.8,
            url: "http://www.blackberry.com/btsc/KB36051",
         },
         {
            title: "cisco-sa-20140605-openssl",
            trust: 0.8,
            url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl",
         },
         {
            title: "トップページ",
            trust: 0.8,
            url: "http://fedoraproject.org/ja/",
         },
         {
            title: "Multiple Vulnerabilities in OpenSSL",
            trust: 0.8,
            url: "http://www.fortiguard.com/advisory/FG-IR-14-018/",
         },
         {
            title: "HIRT-PUB14010",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/hirt/publications/hirt-pub14010/index.html",
         },
         {
            title: "HPSBHF03293 SSRT101846",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04595951",
         },
         {
            title: "Once Bled, Twice Shy (OpenSSL: CVE-2014-0195)",
            trust: 0.8,
            url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048#.U5ULr1SCgdU",
         },
         {
            title: "ZDI-14-173/CVE-2014-0195 - OpenSSL DTLS Fragment Out-of-Bounds Write: Breaking up is hard to do",
            trust: 0.8,
            url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002#.U5ULsVSCgdU",
         },
         {
            title: "1673137",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            title: "1676035",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            title: "1676062",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            title: "1676419",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            title: "1677695",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            title: "1677828",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            title: "1676128",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            title: "1678167",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            title: "00001841",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            title: "1678289",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            title: "00001843",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            title: "2079783",
            trust: 0.8,
            url: "http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2079783",
         },
         {
            title: "SB10075",
            trust: 0.8,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075",
         },
         {
            title: "Fix for CVE-2014-0195",
            trust: 0.8,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3",
         },
         {
            title: "Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2014",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2014 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014verbose-1972958.html",
         },
         {
            title: "Bug 1103598",
            trust: 0.8,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598",
         },
         {
            title: "SA80",
            trust: 0.8,
            url: "https://kb.bluecoat.com/index?page=content&id=SA80",
         },
         {
            title: "Huawei-SA-20140613-OpenSSL",
            trust: 0.8,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            title: "SOL15356: OpenSSL vulnerability CVE-2014-0195",
            trust: 0.8,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html",
         },
         {
            title: "January 2015 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update",
         },
         {
            title: "CVE-2014-0195 Buffer Errors vulnerability in OpenSSL",
            trust: 0.8,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0195_buffer_errors",
         },
         {
            title: "VMSA-2014-0012",
            trust: 0.8,
            url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
         },
         {
            title: "OpenSSLの脆弱性(CVE-2014-0224他)によるテープライブラリ装置への影響について",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssl_cve20140224_tape_library.html",
         },
         {
            title: "cisco-sa-20140605-openssl",
            trust: 0.8,
            url: "http://www.cisco.com/cisco/web/support/JP/112/1122/1122700_cisco-sa-20140605-openssl-j.html",
         },
         {
            title: "Symfoware Server: OpenSSLの脆弱性(CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470)(2014年7月15日)",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/products-fujitsu/solution/symfoware_201404.html",
         },
         {
            title: "openssl-1.0.1h",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51081",
         },
         {
            title: "openssl-1.0.0m",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51080",
         },
         {
            title: "openssl-0.9.8za",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51079",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/07/25/how_long_is_too_long_to_wait_for_a_security_update/",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/06/06/thanks_for_nothing_openssl_cries_stonewalled_de_raadt/",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2014/06/05/openssl_bug_batch/",
         },
         {
            title: "Red Hat: CVE-2014-0195",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0195",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-3",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-4",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-1",
         },
         {
            title: "Ubuntu Security Notice: openssl regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2232-2",
         },
         {
            title: "Debian Security Advisories: DSA-2950-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=909292f2afe623fbec51f7ab6b32f790",
         },
         {
            title: "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=07d14df4883f21063a053cea8d2239c6",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-349",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-349",
         },
         {
            title: "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=dd4667746d163d08265dfdd4c98e4201",
         },
         {
            title: "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=eee4d8c3e2b11de5b15ee65d96af6c60",
         },
         {
            title: "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=afbd3a710e98424e558b1b21482abad6",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - January 2015",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51",
         },
         {
            title: "Oracle: Oracle Critical Patch Update Advisory - October 2017",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a",
         },
         {
            title: "CVE-2014-0195",
            trust: 0.1,
            url: "https://github.com/ricedu/CVE-2014-0195 ",
         },
         {
            title: "changelog",
            trust: 0.1,
            url: "https://github.com/securityrouter/changelog ",
         },
         {
            title: "changelog",
            trust: 0.1,
            url: "https://github.com/halon/changelog ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/PotterXma/linux-deployment-standard ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/SF4bin/SEEKER_dataset ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/hrbrmstr/internetdb ",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-120",
            trust: 1,
         },
         {
            problemtype: "CWE-119",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.9,
            url: "http://www.openssl.org/news/secadv_20140605.txt",
         },
         {
            trust: 2.6,
            url: "http://support.citrix.com/article/ctx140876",
         },
         {
            trust: 2.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
         },
         {
            trust: 2.3,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0012.html",
         },
         {
            trust: 2.3,
            url: "http://www.vmware.com/security/advisories/vmsa-2014-0006.html",
         },
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/67900",
         },
         {
            trust: 2.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg24037783",
         },
         {
            trust: 2.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 2.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 2,
            url: "https://kb.bluecoat.com/index?page=content&id=sa80",
         },
         {
            trust: 2,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
         },
         {
            trust: 2,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
         },
         {
            trust: 2,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10075",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
         },
         {
            trust: 2,
            url: "http://www.fortiguard.com/advisory/fg-ir-14-018/",
         },
         {
            trust: 2,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757",
         },
         {
            trust: 2,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756",
         },
         {
            trust: 2,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755",
         },
         {
            trust: 2,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071",
         },
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821",
         },
         {
            trust: 2,
            url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6",
         },
         {
            trust: 2,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
         },
         {
            trust: 1.8,
            url: "http://security.gentoo.org/glsa/glsa-201407-05.xml",
         },
         {
            trust: 1.7,
            url: "http://h30499.www3.hp.com/t5/hp-security-research-blog/once-bled-twice-shy-openssl-cve-2014-0195/ba-p/6501048",
         },
         {
            trust: 1.7,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598",
         },
         {
            trust: 1.7,
            url: "http://h30499.www3.hp.com/t5/hp-security-research-blog/zdi-14-173-cve-2014-0195-openssl-dtls-fragment-out-of-bounds/ba-p/6501002",
         },
         {
            trust: 1.7,
            url: "http://www.blackberry.com/btsc/kb36051",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59301",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59450",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59491",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59721",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59655",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59659",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59162",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59528",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58939",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59666",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59587",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59126",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59490",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59514",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59669",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59413",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58883",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59300",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59895",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59530",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59342",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59451",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58743",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59990",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/60571",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59784",
         },
         {
            trust: 1.7,
            url: "http://support.apple.com/kb/ht6443",
         },
         {
            trust: 1.7,
            url: "http://seclists.org/fulldisclosure/2014/dec/23",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
         },
         {
            trust: 1.7,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
         },
         {
            trust: 1.7,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
         },
         {
            trust: 1.7,
            url: "https://www.novell.com/support/kb/doc.php?id=7015271",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1030337",
         },
         {
            trust: 1.7,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2014:106",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/61254",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59518",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59454",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59449",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59441",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59437",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59429",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59365",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59364",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59310",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59306",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59305",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59287",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59223",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59192",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59189",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59188",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59175",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/59040",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58977",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58945",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58714",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58713",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58660",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58615",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/58337",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.7,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.7,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10629",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
         },
         {
            trust: 1.7,
            url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0221",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3470",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 1.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 1.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=1632ef744872edc2aa2a53d487d3e79c965a4ad3",
         },
         {
            trust: 0.9,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu93868849/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0195",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0198",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2010-5298",
         },
         {
            trust: 0.6,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/solutions/len-24443",
         },
         {
            trust: 0.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-0625.html",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0076",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.4,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.3,
            url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045",
         },
         {
            trust: 0.3,
            url: "http://www.cerberusftp.com/products/releasenotes.html",
         },
         {
            trust: 0.3,
            url: "http://googlechromereleases.blogspot.com/2014/06/chrome-for-android-update.html",
         },
         {
            trust: 0.3,
            url: "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0195_buffer_errors",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678123",
         },
         {
            trust: 0.3,
            url: "http://www.openssl.org",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181245",
         },
         {
            trust: 0.3,
            url: "http://www8.hp.com/us/en/software-solutions/operations-analytics-operations-analysis/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685551",
         },
         {
            trust: 0.3,
            url: "http://www.marshut.com/ixwnpv/stunnel-5-02-released.html",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100181099",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/84",
         },
         {
            trust: 0.3,
            url: "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true&externalid=kb36051&sliceid=1&cmd=&forward=nonthreadedkc&command=show&kcid=kb36051&viewe",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04363613",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368523",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678356",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21676889",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676673",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676041",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676128",
         },
         {
            trust: 0.3,
            url: "http://www.zerodayinitiative.com/advisories/zdi-14-173/",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676356",
         },
         {
            trust: 0.3,
            url: "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities",
         },
         {
            trust: 0.3,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676793",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676840",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678104",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682023",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682025",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682024",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21678289",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www.ubuntu.com/usn/usn-2232-4/",
         },
         {
            trust: 0.2,
            url: "http://www.ubuntu.com/usn/usn-2232-1",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/120.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/ricedu/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=34546",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2232-3/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4378",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4379",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht1222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0238",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1943",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4376",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-7345",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4377",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4350",
         },
         {
            trust: 0.1,
            url: "http://www.apple.com/support/downloads/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4381",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2525",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0237",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3480",
         },
         {
            trust: 0.1,
            url: "http://www.vsecurity.com/)",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-2270",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0207",
         },
         {
            trust: 0.1,
            url: "http://gpgtools.org",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3515",
         },
         {
            trust: 0.1,
            url: "http://support.apple.com/kb/ht6367",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3479",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-1391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3478",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4049",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-4374",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3981",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/lid/oo_00030",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1356843",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.21",
         },
         {
            trust: 0.1,
            url: "http://www.ubuntu.com/usn/usn-2232-4",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-10.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-9.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-10.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://www.openssl.org/news/secadv_20140605.txt>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:14.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0195>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:14/openssl-9.patch",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-f6c141a7feeb4a358bbb28300f",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-bd9a1cf60e344c549c4888db93",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-3395d737d98f42149125b9bb05",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-c0d32bac154a4d93839d8cd1f2",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-8aefeaf490284a7691eca97d13",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com/swpublishing/mtx-e8076c2a35804685ad65b2b1ba",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0287",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0209",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0289",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150319.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "http://openssl.org/news/secadv_20150108.txt",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0204",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/en/support/security/advisories/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3571",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0288",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3570",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-8275",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3572",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0293",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0206",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3470",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5298",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0221",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0198",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/solutions/905793",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0224.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/11258",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0198.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/site/articles/904433",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2010-5298.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.1,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3470.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0221.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-0195.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://www.hpe.com/info/report-security-vulnerability",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "http://h17007.www1.hp.com/us/en/enterprise/servers/products/service_pack/hpsu",
         },
         {
            trust: 0.1,
            url: "http://support.openview.hp.com/selfsolve/document/km01020441",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.4",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.18",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.14",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "BID",
            id: "67900",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "127807",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            db: "BID",
            id: "67900",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            db: "PACKETSTORM",
            id: "127807",
         },
         {
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-06-05T00:00:00",
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            date: "2014-06-05T00:00:00",
            db: "BID",
            id: "67900",
         },
         {
            date: "2014-06-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            date: "2014-09-19T15:26:13",
            db: "PACKETSTORM",
            id: "128315",
         },
         {
            date: "2014-07-11T21:04:18",
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            date: "2014-08-18T23:09:13",
            db: "PACKETSTORM",
            id: "127917",
         },
         {
            date: "2014-06-05T19:57:42",
            db: "PACKETSTORM",
            id: "126937",
         },
         {
            date: "2014-06-05T21:06:55",
            db: "PACKETSTORM",
            id: "126957",
         },
         {
            date: "2014-08-08T21:53:16",
            db: "PACKETSTORM",
            id: "127807",
         },
         {
            date: "2015-03-27T20:42:44",
            db: "PACKETSTORM",
            id: "131044",
         },
         {
            date: "2014-07-28T20:36:25",
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            date: "2014-06-05T15:17:27",
            db: "PACKETSTORM",
            id: "126927",
         },
         {
            date: "2017-01-25T21:54:44",
            db: "PACKETSTORM",
            id: "140720",
         },
         {
            date: "2014-07-02T21:43:37",
            db: "PACKETSTORM",
            id: "127326",
         },
         {
            date: "2014-07-09T17:11:19",
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            date: "2014-06-05T15:14:53",
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            date: "2014-06-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            date: "2014-06-05T21:55:06.147000",
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-06-05T00:00:00",
            db: "ZDI",
            id: "ZDI-14-173",
         },
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2014-0195",
         },
         {
            date: "2017-05-23T16:25:00",
            db: "BID",
            id: "67900",
         },
         {
            date: "2015-12-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
         {
            date: "2022-07-01T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
         {
            date: "2024-11-21T02:01:36.410000",
            db: "NVD",
            id: "CVE-2014-0195",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "127421",
         },
         {
            db: "PACKETSTORM",
            id: "127630",
         },
         {
            db: "PACKETSTORM",
            id: "127403",
         },
         {
            db: "PACKETSTORM",
            id: "126925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
      ],
      trust: 1,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL of  d1_both.c of  dtls1_reassemble_fragment Vulnerability in arbitrary code execution in function",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2014-002765",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201406-078",
         },
      ],
      trust: 0.6,
   },
}

var-201605-0373
Vulnerability from variot

IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 through 1.0.0.4 do not require HTTPS, which might allow remote attackers to obtain sensitive information by sniffing the network. IBMB2BAdvanced Communications is a communications gateway product. Multiple IBM Products is prone to a local information-disclosure vulnerability. There is an information disclosure vulnerability in , which is caused by the fact that the program is not configured with HTTPS

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0373",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "1.0.0.3",
         },
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 1.9,
            vendor: "ibm",
            version: "1.0.0.2",
         },
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "1.0.0.1",
         },
         {
            model: "multi-enterprise integration gateway",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "1.0.0",
         },
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "1.0.0.2 to  1.0.0.4",
         },
         {
            model: "multi-enterprise integration gateway",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "1.0.0.1 for up to  1.0",
         },
         {
            model: "b2b advanced communications",
            scope: "gte",
            trust: 0.6,
            vendor: "ibm",
            version: "1.0.0.2<=1.0.0.4",
         },
         {
            model: "transformation extender advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "transformation extender advanced",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.6",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.5.0",
         },
         {
            model: "standards processing engine",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.1.2",
         },
         {
            model: "multi-enterprise integration gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.0.1",
         },
         {
            model: "multi-enterprise integration gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "b2b advanced communications",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.0.4",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "BID",
            id: "89859",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:b2b_advanced_communications",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:multi-enterprise_integration_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "89859",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2016-0341",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2016-0341",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 6.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2016-02871",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-87851",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  id: "CVE-2016-0341",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.8,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2016-0341",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2016-0341",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2016-02871",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201605-130",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-87851",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 through 1.0.0.4 do not require HTTPS, which might allow remote attackers to obtain sensitive information by sniffing the network. IBMB2BAdvanced Communications is a communications gateway product. Multiple IBM Products is prone to a local information-disclosure vulnerability. There is an information disclosure vulnerability in , which is caused by the fact that the program is not configured with HTTPS",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "BID",
            id: "89859",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-0341",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "89859",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            db: "BID",
            id: "89859",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   id: "VAR-201605-0373",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
      ],
      trust: 0.06999999999999999,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
      ],
   },
   last_update_date: "2024-11-23T22:52:40.906000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1981462",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21981462",
         },
         {
            title: "Patch for IBMB2BAdvanced Communications Information Disclosure Vulnerability (CNVD-2016-02871)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchInfo/show/75410",
         },
         {
            title: "IBM B2B Advanced Communications Repair measures for information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61453",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21981462",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1it14835",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0341",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0341",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21985111",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21987644",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            db: "BID",
            id: "89859",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            db: "BID",
            id: "89859",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            date: "2016-05-15T00:00:00",
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            date: "2016-05-02T00:00:00",
            db: "BID",
            id: "89859",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            date: "2016-05-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            date: "2016-05-15T01:59:00.160000",
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-05-10T00:00:00",
            db: "CNVD",
            id: "CNVD-2016-02871",
         },
         {
            date: "2016-05-19T00:00:00",
            db: "VULHUB",
            id: "VHN-87851",
         },
         {
            date: "2016-08-11T13:00:00",
            db: "BID",
            id: "89859",
         },
         {
            date: "2016-05-23T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
         {
            date: "2016-05-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
         {
            date: "2024-11-21T02:41:31.270000",
            db: "NVD",
            id: "CVE-2016-0341",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Multi-Enterprise Integration Gateway and  B2B Advanced Communications Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-002774",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201605-130",
         },
      ],
      trust: 0.6,
   },
}

var-201307-0065
Vulnerability from variot

IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0065",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 2.7,
            vendor: "ibm",
            version: "5.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "60989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_b2b_integrator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:ibm:sterling_file_gateway",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM",
      sources: [
         {
            db: "BID",
            id: "60989",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2013-2985",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "CVE-2013-2985",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-62987",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2013-2985",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2013-2985",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201307-061",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-62987",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. Multiple IBM products are prone to an unspecified information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. IBM Sterling File Gateway is a set of file transfer software that integrates different file transfer methods and can realize secure interaction through the network",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "BID",
            id: "60989",
         },
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-2985",
            trust: 2.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "84008",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "2",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "60989",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-62987",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            db: "BID",
            id: "60989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   id: "VAR-201307-0065",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:22:20.089000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1640830",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/84008",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2985",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2985",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/84008",
         },
         {
            trust: 0.3,
            url: "http://www-03.ibm.com/software/products/us/en/file-gateway/",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/software/commerce/b2b/products/b2b-integrator/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            db: "BID",
            id: "60989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            db: "BID",
            id: "60989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-07-03T00:00:00",
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60989",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            date: "2013-07-03T13:54:31.087000",
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-29T00:00:00",
            db: "VULHUB",
            id: "VHN-62987",
         },
         {
            date: "2013-07-01T00:00:00",
            db: "BID",
            id: "60989",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
         {
            date: "2013-07-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
         {
            date: "2017-08-29T01:33:18.823000",
            db: "NVD",
            id: "CVE-2013-2985",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM Sterling B2B Integrator and  Sterling File Gateway Vulnerability in which important information is obtained",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-003207",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201307-061",
         },
      ],
      trust: 0.6,
   },
}

var-201408-0081
Vulnerability from variot

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue. OpenSSL is prone to security-bypass vulnerability. Successfully exploiting these issues may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. OpenSSL 1.0.1 versions prior to 1.0.1i are vulnerable.

Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz: Upgraded. ( Security fix ) +--------------------------+

Where to find the new packages: +-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz

Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz

MD5 signatures: +-------------+

Slackware 13.0 packages: 30bdc015b10d8891b90d3f6ea34f5fdd openssl-0.9.8zb-i486-1_slack13.0.txz 3dc4140c22c04c94e5e74386a5a1c200 openssl-solibs-0.9.8zb-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages: 3da32f51273762d67bf9dbcc91af9413 openssl-0.9.8zb-x86_64-1_slack13.0.txz 075e5d12e5b909ecac923cb210f83544 openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz

Slackware 13.1 packages: 3b7e2bb2b317bf72b8f9b2b7a14bddfb openssl-0.9.8zb-i486-1_slack13.1.txz 92af0784eade0674332a56bfab73b97d openssl-solibs-0.9.8zb-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages: df5f961109d7b50971660ca6a7d4c48c openssl-0.9.8zb-x86_64-1_slack13.1.txz 582aaeae3d56730a2e1538a67d4e44da openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz

Slackware 13.37 packages: 546445d56d3b367fa0dd4e80859c4620 openssl-0.9.8zb-i486-1_slack13.37.txz b80e9df8cdd0649939ec2fab20d24691 openssl-solibs-0.9.8zb-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages: 9c9ce97dc21340924a3e27c1a8047023 openssl-0.9.8zb-x86_64-1_slack13.37.txz 0fe1931f2fc82fb8d5fbe72680caf843 openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz

Slackware 14.0 packages: d1580f4b22b99cee42b22276653c8180 openssl-1.0.1i-i486-1_slack14.0.txz ec93cec2bcab8ae7391a504573cbc231 openssl-solibs-1.0.1i-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages: 329475de3759225b1d02aa7317b2eb58 openssl-1.0.1i-x86_64-1_slack14.0.txz 25f2a198022d974534986a3913ca705c openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz

Slackware 14.1 packages: 8336457bc31d44ebf502ffc4443f12f7 openssl-1.0.1i-i486-1_slack14.1.txz 4b99ac357fbd3065c53367eea246b8c7 openssl-solibs-1.0.1i-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages: f2b8f81d9d7dc02e5d1011f663ccc95d openssl-1.0.1i-x86_64-1_slack14.1.txz 4360abffbb57cb18ba0720f782d78250 openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz

Slackware -current packages: 49ecd332a899cf742d3467a6efe44269 a/openssl-solibs-1.0.1i-i486-1.txz 27da017c49045981b1793f105aff365f n/openssl-1.0.1i-i486-1.txz

Slackware x86_64 -current packages: 8d74f3d770802182137c84d925f58cbc a/openssl-solibs-1.0.1i-x86_64-1.txz fd9d94d3210f0aedf74959cb0887e2b8 n/openssl-1.0.1i-x86_64-1.txz

Installation instructions: +------------------------+

Upgrade the packages as root:

upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Relevant releases/architectures:

RHEV-M 3.5 - noarch

  1. Description:

Red Hat Enterprise Virtualization Manager provides access to virtual machines using SPICE. These SPICE client packages provide the SPICE client and usbclerk service for both Windows 32-bit operating systems and Windows 64-bit operating systems. (CVE-2014-3511)

This update also fixes the following bugs:

  • Previously, various clipboard managers, operating on the client or on the guest, would occasionally lose synchronization, which resulted in clipboard data loss and the SPICE console freezing. Now, spice-gtk have been patched, such that clipboard synchronization does not freeze the SPICE console anymore. (BZ#1083489)

  • Prior to this update, when a SPICE console was launched from the Red Hat Enterprise Virtualization User Portal with the 'Native Client' invocation method and 'Open in Full Screen' selected, the displays of the guest virtual machine were not always configured to match the client displays. After this update, the SPICE console will show a full-screen guest display for each client monitor. (BZ#1076243)

  • A difference in behavior between Linux and Windows clients caused an extra nul character to be sent when pasting text in a guest machine from a Windows client. This invisible character was visible in some Java applications. With this update, the extra nul character is removed from text strings and no more extraneous character would appear. (BZ#1090122)

  • Previously, If the clipboard is of type image/bmp, and the data is of 0 size, GTK+ will crash. With this update, the data size is checked first, and GTK+ no longer crashes when clipboard is of type image/bmp, and the data is of 0 size. (BZ#1090433)

  • Modifier-only key combinations cannot be registered by users as hotkeys so if a user tries to set a modifier-only key sequence (for example, 'ctrl+alt') as the hotkey for releasing the cursor, it will fail, and the user will be able to release the cursor from the window. With this update, when a modifier-only hotkey is attempted to be registered, it will fall back to the default cursor-release sequence (which happens to be 'ctrl+alt'). (BZ#985319)

  • Display configuration sometimes used outdated information about the position of the remote-viewer windows in order to align and configure the guest displays. Occasionally, this caused the guest displays to became unexpectedly swapped when a window is resized. With this update, remote-viewer will always use the current window locations to align displays, rather than using a possibly outdated cached location information. Bugs fixed (https://bugzilla.redhat.com/):

1018145 - --full-screen=auto-conf sometimes (but frequently) doesn't work correctly 1018182 - primary monitor is switched if some screen gets bigger then current primary screen 1076243 - [BUG] RHEV SPICE console not opening in full screen or detecting resolution by default 1083489 - [SPICE][BUG] Spice session freezes randomly 1090122 - Pasting into java apps inserts unprintable character 1090433 - [GTK][BUG] win32: add more clipboard data checks to avoid crash 1103366 - Rebase virt-viewer to 0.6.0 1105650 - Fix windows productversion to fit -z releases 1115445 - in About dialog, hyphen version-build dividing hyphen is missing 1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext 1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openssl security update Advisory ID: RHSA-2014:1052-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1052.html Issue date: 2014-08-13 CVE Names: CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 =====================================================================

  1. Summary:

Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.

A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code. (CVE-2014-3509)

It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508)

A flaw was found in the way OpenSSL handled fragmented handshake packets. (CVE-2014-3511)

Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)

A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. A malicious server could cause a DTLS client using OpenSSL to crash if that client had anonymous DH cipher suites enabled. (CVE-2014-3510)

All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions 1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext 1127499 - CVE-2014-3505 openssl: DTLS packet processing double free 1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion 1127502 - CVE-2014-3507 openssl: DTLS memory leak from zero-length fragments 1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service 1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm

ppc64: openssl-1.0.1e-16.el6_5.15.ppc.rpm openssl-1.0.1e-16.el6_5.15.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.15.ppc.rpm openssl-devel-1.0.1e-16.el6_5.15.ppc64.rpm

s390x: openssl-1.0.1e-16.el6_5.15.s390.rpm openssl-1.0.1e-16.el6_5.15.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm openssl-devel-1.0.1e-16.el6_5.15.s390.rpm openssl-devel-1.0.1e-16.el6_5.15.s390x.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

ppc64: openssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.15.ppc64.rpm openssl-static-1.0.1e-16.el6_5.15.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm openssl-perl-1.0.1e-16.el6_5.15.s390x.rpm openssl-static-1.0.1e-16.el6_5.15.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-1.0.1e-16.el6_5.15.i686.rpm openssl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.15.i686.rpm openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: openssl-1.0.1e-16.el6_5.15.src.rpm

i386: openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm openssl-perl-1.0.1e-16.el6_5.15.i686.rpm openssl-static-1.0.1e-16.el6_5.15.i686.rpm

x86_64: openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

ppc64: openssl-1.0.1e-34.el7_0.4.ppc64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm openssl-devel-1.0.1e-34.el7_0.4.ppc.rpm openssl-devel-1.0.1e-34.el7_0.4.ppc64.rpm openssl-libs-1.0.1e-34.el7_0.4.ppc.rpm openssl-libs-1.0.1e-34.el7_0.4.ppc64.rpm

s390x: openssl-1.0.1e-34.el7_0.4.s390x.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm openssl-devel-1.0.1e-34.el7_0.4.s390.rpm openssl-devel-1.0.1e-34.el7_0.4.s390x.rpm openssl-libs-1.0.1e-34.el7_0.4.s390.rpm openssl-libs-1.0.1e-34.el7_0.4.s390x.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm openssl-perl-1.0.1e-34.el7_0.4.ppc64.rpm openssl-static-1.0.1e-34.el7_0.4.ppc.rpm openssl-static-1.0.1e-34.el7_0.4.ppc64.rpm

s390x: openssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm openssl-perl-1.0.1e-34.el7_0.4.s390x.rpm openssl-static-1.0.1e-34.el7_0.4.s390.rpm openssl-static-1.0.1e-34.el7_0.4.s390x.rpm

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openssl-1.0.1e-34.el7_0.4.src.rpm

x86_64: openssl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.4.i686.rpm openssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.4.i686.rpm openssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm openssl-static-1.0.1e-34.el7_0.4.i686.rpm openssl-static-1.0.1e-34.el7_0.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2014-3505.html https://www.redhat.com/security/data/cve/CVE-2014-3506.html https://www.redhat.com/security/data/cve/CVE-2014-3507.html https://www.redhat.com/security/data/cve/CVE-2014-3508.html https://www.redhat.com/security/data/cve/CVE-2014-3509.html https://www.redhat.com/security/data/cve/CVE-2014-3510.html https://www.redhat.com/security/data/cve/CVE-2014-3511.html https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20140806.txt

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD8DBQFT69raXlSAg2UNWIIRAiQAAKCbp6Iou4mHuootBfgs0jm7zP/wWACgt50C pHXxupQnHYYH+zJFOmk5u8o= =DwUW -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .

References:

CVE-2014-3508 CVE-2014-3509 CVE-2014-3511 CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-5139 SSRT101894 SSRT101916 SSRT101918 SSRT101920 SSRT101921 SSRT101922 SSRT101923 SSRT101925 SSRT101926 SSRT101927

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The HP Matrix Operating Environment v7.2.3 Update kit applicable to HP Matrix Operating Environment 7.2.x installations is available at the following location:

https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =HPID

NOTE: Please read the readme.txt file before proceeding with the installation.

Detailed descriptions of the vulnerabilities can be found at: https://www.openssl.org/news/secadv_20140806.txt

It's important that you upgrade the libssl1.0.0 package and not just the openssl package. Alternatively, you may reboot your system.

For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u12.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in version 1.0.1i-1. Corrected: 2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE) 2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8) 2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE) 2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1) 2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11) 2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18) 2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE) 2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15) CVE Name: CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510, CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

FreeBSD includes software from the OpenSSL Project.

II. [CVE-2014-5139]

III.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 10.0]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc

gpg --verify openssl-10.0.patch.asc

[FreeBSD 9.3]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc

gpg --verify openssl-9.3.patch.asc

[FreeBSD 9.2, 9.1, 8.4]

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch

fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc

gpg --verify openssl-9.patch.asc

b) Apply the patch. Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as described in .

Restart all deamons using the library, or reboot the system.

3) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:

freebsd-update fetch

freebsd-update install

VI. Correction details

The following list contains the correction revision numbers for each affected branch.

Branch/path Revision


stable/8/ r269687 releng/8.4/ r271305 stable/9/ r269687 releng/9.1/ r271305 releng/9.2/ r271305 releng/9.3/ r271305 stable/10/ r269686 releng/10.0/ r271304


To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:

svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII.

A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. (CVE-2015-0235)

A race condition flaw was found in the way the Linux kernel's KVM subsystem handled PIT (Programmable Interval Timer) emulation. A guest user who has access to the PIT I/O ports could use this flaw to crash the host. (CVE-2014-3567)

It was found that the Linux kernel's KVM subsystem did not handle the VM exits gracefully for the invept (Invalidate Translations Derived from EPT) and invvpid (Invalidate Translations Based on VPID) instructions. On hosts with an Intel processor and invept/invppid VM exit support, an unprivileged guest user could use these instructions to crash the guest. (CVE-2014-3645, CVE-2014-3646)

Red Hat would like to thank Qualys for reporting the CVE-2015-0235 issue, Lars Bull of Google for reporting the CVE-2014-3611 issue, and the Advanced Threat Research team at Intel Security for reporting the CVE-2014-3645 and CVE-2014-3646 issues. Bugs fixed (https://bugzilla.redhat.com/):

1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack 1144825 - CVE-2014-3646 kernel: kvm: vmx: invvpid vm exit not handled 1144835 - CVE-2014-3645 kernel: kvm: vmx: invept vm exit not handled 1144878 - CVE-2014-3611 kernel: kvm: PIT timer race condition 1152563 - Tracker: RHEV-H 6.6 for RHEV 3.4.z build 1152961 - CVE-2014-3567 openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash 1180044 - Incorrect glusterfs package in to RHEVH 6.6 for 3.4.4 and 3.5 build [rhev-3.4.z] 1183461 - CVE-2015-0235 glibc: __nss_hostname_digits_dots() heap-based buffer overflow 1185720 - Incorrect rhn-virtualization-host and rhn-virtualization-common packages in RHEVH 6.6 for rhev 3.4.5

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04512909

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04512909 Version: 2

HPSBMU03216 rev.2 - HP Service Manager running SSLv3, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2015-01-22 Last Updated: 2015-01-23

Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Service Manager running SSLv3. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), unauthorized access or disclosure of information.

References:

CVE-2014-0224 Remote Unauthorized Access, Disclosure of Information CVE-2014-3509 Remote Denial of Service (DoS) CVE-2014-3511 Remote Unauthorized Access, Disclosure of Information CVE-2014-5139 Remote Denial of Service (DoS) SSRT101818

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. ServiceCenter 6.2

Service Manager 7.10

Service Manager 7.11

Service Manager 9.20

Service Manager 9.21

Service Manager 9.30

Service Manager 9.31

Service Manager 9.32

Service Manager 9.33

Service Manager 9.34

Note: not impacted by CVE-2014-0224

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has released the following software updates for HP Service Manager to resolve these vulnerabilities. Note: For versions not listed, please contact support:

Note: ServiceCenter 6.2 is impacted only if using the Directory Services integration feature with the SC LDAP over SSL (LDAPS) protocol. If this feature is in use, HP recommends that ServiceCenter 6.2 customers upgrade to Service Manager 7.11, 9.21, or 9.34, and then apply the patches listed below.

Patch Version Package Name / SSO URL

SM711P22 AIX Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00614

HP Itanium Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00615

HP parisc Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00616

Linux x86 Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00617

Solaris Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00618

Windows Server 7.11.720 p22 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00619

SM921P9 AIX server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00621

HPUX/IA server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00622

HPUX/PA server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00623

Linux server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00624

Solaris server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00625

Windows server 9.21.706 P9 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00626

SM934P2 AIX Server 9.34.2003 p2 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00605

HP Itanium Server 9.34.2003 p2 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00606

Linux Server 9.34.2003 p2 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00607

Solaris Server 9.34.2003 p2 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00608

Windows Server 9.34.2003 p2 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse arch/document/LID/HPSM_00609

HISTORY Version:1 (rev.1) - 22 January 2015 Initial release Version:2 (rev.2) - 23 January 2015 added note for versions not listed in table.

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. OpenSSL Security Advisory [6 Aug 2014] ========================================

Information leak in pretty printing functions (CVE-2014-3508)

A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.

OpenSSL 0.9.8 users should upgrade to 0.9.8zb OpenSSL 1.0.0 users should upgrade to 1.0.0n. OpenSSL 1.0.1 users should upgrade to 1.0.1i.

Thanks to Ivan Fratric (Google) for discovering this issue. This issue was reported to OpenSSL on 19th June 2014.

The fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL development team. This can be exploited through a Denial of Service attack.

OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and researching this issue. This issue was reported to OpenSSL on 2nd July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

OpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i.

Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this issue. This issue was reported to OpenSSL on 8th July 2014.

The fix was developed by Gabor Tyukasz.

Double Free when processing DTLS packets (CVE-2014-3505)

An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i.

Thanks to Adam Langley and Wan-Teh Chang (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley. This can be exploited through a Denial of Service attack.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley. This can be exploited through a Denial of Service attack.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i.

Thanks to Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 6th June 2014.

The fix was developed by Adam Langley.

OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)

OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages.

OpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb OpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. OpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i.

Thanks to Felix Gröbert (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 18th July 2014.

The fix was developed by Emilia Käsper of the OpenSSL development team.

OpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i.

Thanks to David Benjamin and Adam Langley (Google) for discovering and researching this issue. This issue was reported to OpenSSL on 21st July 2014.

The fix was developed by David Benjamin.

SRP buffer overrun (CVE-2014-3512)

A malicious client or server can send invalid SRP parameters and overrun an internal buffer. Only applications which are explicitly set up for SRP use are affected.

OpenSSL 1.0.1 SSL/TLS users should upgrade to 1.0.1i.

Thanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC Group) for discovering this issue. This issue was reported to OpenSSL on 31st July 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

References

URL for this Security Advisory: https://www.openssl.org/news/secadv_20140806.txt

Note: the online version of the advisory may be updated with additional details over time

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201408-0081",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1.6,
            vendor: "openssl",
            version: "1.0.1e",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0k",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0j",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0d",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0f",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0i",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0c",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0b",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0l",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0h",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0g",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0a",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0m",
         },
         {
            model: "openssl",
            scope: "eq",
            trust: 1,
            vendor: "openssl",
            version: "1.0.0e",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "8.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-beta",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "-release-p2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "8.4-release-p15",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "project openssl 1.0.1e",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.0.4",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "project openssl 1.0.1a",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.016",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.0",
         },
         {
            model: "8.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.2-release-p11",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.470",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.0.0",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.3",
         },
         {
            model: "tivoli netcool/reporter",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "vios fp-25 sp-02",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "9.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.3-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "insight control server provisioning",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.0",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.2",
         },
         {
            model: "netscaler t1",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "7.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.4-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "7.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.34",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "10",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.4",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79120",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.8",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.1.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2407863",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1.0",
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79180",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35007383",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.2",
         },
         {
            model: "release-p4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.0",
         },
         {
            model: "tivoli endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2.1",
         },
         {
            model: "project openssl 1.0.1g",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.0",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.4",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "10.0-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "7.0",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "9.1-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.8",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2207906",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.14",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "command center appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "-release/alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "8.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.0",
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.00",
         },
         {
            model: "9.2-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "netscaler gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "junos os 14.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5",
         },
         {
            model: "2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "9.1--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "proventia network security controller 1.0.3352m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "idatplex dx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79130",
         },
         {
            model: "infosphere master data management patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "6.3-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.0",
         },
         {
            model: "9.3-beta3-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.1c",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "9.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "qradar siem mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "-stablepre2001-07-20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "8.3-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.10",
         },
         {
            model: "6.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.14",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "9.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x33007382",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.1",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "virtual connect 8gb 24-port fc module",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.0",
         },
         {
            model: "7.2-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.0-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "9.0-rc3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "junos os 13.3r4",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.11",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "endpoint manager for remote control",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3850x638370",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "netscaler application delivery controller",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.20",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.2",
         },
         {
            model: "oncommand unified manager core package",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "9.1-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.1",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.2",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.13",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "7.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "9.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7955",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "nextscale nx360 m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "54550",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.08",
         },
         {
            model: "7.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.015",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.13",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2x",
         },
         {
            model: "7.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.0-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "8.4-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.5.0",
         },
         {
            model: "prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408738",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.01",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.2",
         },
         {
            model: "8.1-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.2",
         },
         {
            model: "servicecenter",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0.x",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.3-rc",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "9.3-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.1",
         },
         {
            model: "8.4-release-p13",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "7.1-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.31",
         },
         {
            model: "10.0-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7",
         },
         {
            model: "-pre-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "infosphere master data management provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x365079150",
         },
         {
            model: "rational application developer for websphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.0.1",
         },
         {
            model: "8.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.3",
         },
         {
            model: "9.3-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux load balancer eus 6.5.z",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "9.2-rc2-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "5.3",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.6",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "9.2-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35507914",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.1",
         },
         {
            model: "8.3-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.9",
         },
         {
            model: "project openssl 1.0.1c",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "9.1-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "9.1-release-p16",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.3",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "7.3-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "7.2-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3x",
         },
         {
            model: "9.3-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "8.3-release-p8",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "-stablepre2002-03-07",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "project openssl 1.0.1f",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5.00",
         },
         {
            model: "oncommand workflow automation",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.2",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.4.1",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.0.11",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087330",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.2",
         },
         {
            model: "8.3-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "tivoli provisioning manager for images",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.1",
         },
         {
            model: "upward integration modules scvmm add-in",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.2",
         },
         {
            model: "7.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0.0.0",
         },
         {
            model: "8.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.2-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.3.0a",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "cms r17",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.0",
         },
         {
            model: "7.3-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sdk for node.js",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.7",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0",
         },
         {
            model: "6.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling file gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "oncommand workflow automation",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0",
         },
         {
            model: "oncommand unified manager core package 5.2.1p1",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.0",
         },
         {
            model: "8.4-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "7.4-release-p12",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.1",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "8.3-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2202585",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "10.0-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "9.1-release-p17",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.21",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.3",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.2",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "open systems snapvault 3.0.1p6",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.5",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.1",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-release-p1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "9.3-beta1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.1",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "8-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.4",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2227916",
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "-release-p6",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "8.4-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "qradar risk manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "8.1-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.1",
         },
         {
            model: "8.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "7.1-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.4",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "8.4-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-release-p9",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2-",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "9.1-release-p18",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "junos os 14.1r2-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "flex system fc3171 8gb san pass-thru",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "10.0-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.20",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1",
         },
         {
            model: "7.3-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1i",
            scope: "ne",
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4x",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.0",
         },
         {
            model: "image construction and composition tool",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0.x",
         },
         {
            model: "ip office server edition",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "8.1",
         },
         {
            model: "junos os 13.3r3-s2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "one-x client enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.2",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.33",
         },
         {
            model: "7.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.0.9",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "10.0-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tivoli netcool system service monitor fp1",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.1",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2.2",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.7",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.4",
         },
         {
            model: "6.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8804259",
         },
         {
            model: "10.0-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "i v5r4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.1-release-p15",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.21",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.1",
         },
         {
            model: "7.0-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x37508752",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.2.3",
         },
         {
            model: "8.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.3",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.0",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "i v5r3",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2",
         },
         {
            model: "9.3-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.20",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "8.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.2",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "6.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "9.2-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "system management homepage",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.5",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5x",
         },
         {
            model: "8.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.10",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "aura collaboration environment",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36307158",
         },
         {
            model: "7.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.01",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3.2",
         },
         {
            model: "upward integration modules hardware management pack",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "upward integration modules integrated installer",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5.3",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "10.0-release-p8",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "security network intrusion prevention system gx5108-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "puredata system for operational analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "8.1-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.6",
         },
         {
            model: "bladecenter advanced management module 3.66g",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "8.4-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.2.1",
         },
         {
            model: "9.3-rc2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "qradar vulnerability manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1x",
         },
         {
            model: "9.3-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408737",
         },
         {
            model: "9.0--releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "data ontap smi-s agent",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1.2",
         },
         {
            model: "9.2-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "security network intrusion prevention system gx4002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.2",
         },
         {
            model: "7.4-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0.x",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.01",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.21",
         },
         {
            model: "9.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "ip office application server sp",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.02",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "8.4-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "release -p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2-",
         },
         {
            model: "8.1-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "9.3-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "tivoli netcool system service monitor fp14",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0.0",
         },
         {
            model: "security network intrusion prevention system gx7412-05",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2x",
         },
         {
            model: "tivoli management framework",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1.1",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "7.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.0",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "9.2-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.2.0",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.0.12",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.0",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "8-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1209",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.3.3.0",
         },
         {
            model: "7.3-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "8.2-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x32502583",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "9.2-release-p9",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.0.0",
         },
         {
            model: "initiate master data service provider hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.7",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.7",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "tssc",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.15",
         },
         {
            model: "aura session manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.3.3",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.2",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.5",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.1.1",
         },
         {
            model: "project openssl",
            scope: "eq",
            trust: 0.3,
            vendor: "openssl",
            version: "1.0.1",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "8.4-beta1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "cloudbridge",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x31002582",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.0.1",
         },
         {
            model: "gpfs for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "version control repository manager",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2",
         },
         {
            model: "6.0-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5",
         },
         {
            model: "9.2-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "initiate master data service patient hub",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "upward integration modules for microsoft system center",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.5",
         },
         {
            model: "sterling connect:direct for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.1",
         },
         {
            model: "10.0-rc2-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1d",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "8.4-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.9",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.21",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1x",
         },
         {
            model: "9.3-release-p1",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.2",
         },
         {
            model: "8.4-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "flex system manager",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.2.1.0",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "8.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "tssc",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.16",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "31005.1.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "8.1-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.3.1",
         },
         {
            model: "snapdrive for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "security network intrusion prevention system gx3002",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.8",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "security network intrusion prevention system gv200",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "tealeaf cx",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "flex system fc3171 8gb san switch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1.1",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.913",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "9.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x310054570",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.0",
         },
         {
            model: "insight control server provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "9.0-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1",
         },
         {
            model: "system m4",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x35307160",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "41005.2",
         },
         {
            model: "9.2-rc3-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "insight control",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.3.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "14.0",
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.6.1",
         },
         {
            model: "7.2-release-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.5",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "server migration pack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "flex system fc5022 16gb san scalable switch",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "security network intrusion prevention system gx5008-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "insight control",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.5",
         },
         {
            model: "9.2-release-p4",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "7.02",
         },
         {
            model: "initiate master data service",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.0",
         },
         {
            model: "7.3-release-p6",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "aura experience portal",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0.1",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8400",
         },
         {
            model: "release p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.3--",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "aura experience portal sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "6.0",
         },
         {
            model: "5.4-stable",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "9.1-release-p14",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.1-release-p3",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "virtual connect enterprise manager sdk",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.4.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p10",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3",
         },
         {
            model: "version control agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087180",
         },
         {
            model: "sdk for node.js",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.1.0.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "server migration pack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "9.3-beta1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.14",
         },
         {
            model: "project openssl 1.0.1b",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "cms r17ac.g",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "idatplex dx360 m4 water cooled type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "79190",
         },
         {
            model: "campaign",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "scale out network attached storage",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.4.3.0",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "matrix operating environment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.1",
         },
         {
            model: "sterling connect:direct for microsoft windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.0",
         },
         {
            model: "security network intrusion prevention system gx7412",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.2",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.2",
         },
         {
            model: "system type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x3950x638370",
         },
         {
            model: "10.0-rc1-p1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sametime",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.5.2.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "watson explorer security",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "infosphere master data management standard/advanced edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "11.4",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "security network intrusion prevention system gx5208-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "10.0-stable",
            scope: "ne",
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "9.0-release",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "sterling b2b integrator",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x2408956",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8731",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "7.4",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.0.0.17",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.2",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x8807903",
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.32",
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "tivoli composite application manager for transactions",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.0",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1.2",
         },
         {
            model: "security network protection",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "51005.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "9.2-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for windows",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "10.04",
         },
         {
            model: "8.4-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "snapdrive for unix",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "5.3",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36305466",
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "7.0-release-p11",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "clustered data ontap antivirus connector",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.0",
         },
         {
            model: "security network intrusion prevention system gx5208",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "9.1-release-p10",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "qradar risk manager mr2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "security network intrusion prevention system gx7412-10",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.2.5",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5",
         },
         {
            model: "security network intrusion prevention system gv1000",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.2",
         },
         {
            model: "10.0-release-p7",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "open systems snapvault",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.0.1",
         },
         {
            model: "flex system compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x4407917",
         },
         {
            model: "flashsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "v8400",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.1",
         },
         {
            model: "system m4 hd",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x36505460",
         },
         {
            model: "system m4 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x357087220",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "flex system manager node",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8734",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "13.37",
         },
         {
            model: "netscaler service delivery appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "0",
         },
         {
            model: "tivoli provisioning manager for os deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.1.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "matrix operating environment",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "7.5.1",
         },
         {
            model: "storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2.1",
         },
         {
            model: "websphere datapower soa appliance",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "6.0.1.5",
         },
         {
            model: "proventia network security controller 1.0.3350m",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "ip office application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "9.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.4",
         },
         {
            model: "9.1-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "security network intrusion prevention system gx4004-v2",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "cloudsystem matrix",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.2",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "cms r17ac.h",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "contact optimization",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "system management homepage",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3",
         },
         {
            model: "insight control server deployment",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.2.2",
         },
         {
            model: "security network intrusion prevention system gx5008",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "10.0",
         },
         {
            model: "security network intrusion prevention system gx6116",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.6",
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.3.0",
         },
         {
            model: "flex system fc5022 16gb san scalable switch 7.2.0d5",
            scope: null,
            trust: 0.3,
            vendor: "ibm",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "9.2-rc1-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "8.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "vios",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.2.1.3",
         },
         {
            model: "systems insight manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "6.2",
         },
         {
            model: "security network intrusion prevention system gx7800",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.4",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.2",
         },
         {
            model: "8.2-release-p2",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "proventia network security controller",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "1.0.1768",
         },
         {
            model: "upward integration modules for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.5.1",
         },
         {
            model: "security network intrusion prevention system gx4004",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "4.5",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "system m5 type",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x325054580",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "8.4",
         },
         {
            model: "version control repository manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7.3.4",
         },
         {
            model: "storage provisioning manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.3",
         },
         {
            model: "tivoli provisioning manager for images system edition",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "x7.1.1.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "9.1",
         },
         {
            model: "6.4-releng",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "project openssl 1.0.1h",
            scope: null,
            trust: 0.3,
            vendor: "openssl",
            version: null,
         },
         {
            model: "service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.30",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.1",
         },
         {
            model: "6.4-release-p5",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "websphere datapower soa appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "6.07",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "David Benjamin and Adam Langley of Google",
      sources: [
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2014-3511",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "CVE-2014-3511",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2014-3511",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201408-125",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2014-3511",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue. OpenSSL is prone to security-bypass vulnerability. \nSuccessfully exploiting these issues may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. \nOpenSSL 1.0.1 versions prior to 1.0.1i are vulnerable. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.1i-i486-1_slack14.1.txz:  Upgraded. \n  (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project!  :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zb-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zb-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zb-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zb-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1i-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1i-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1i-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1i-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1i-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1i-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1i-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n30bdc015b10d8891b90d3f6ea34f5fdd  openssl-0.9.8zb-i486-1_slack13.0.txz\n3dc4140c22c04c94e5e74386a5a1c200  openssl-solibs-0.9.8zb-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n3da32f51273762d67bf9dbcc91af9413  openssl-0.9.8zb-x86_64-1_slack13.0.txz\n075e5d12e5b909ecac923cb210f83544  openssl-solibs-0.9.8zb-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n3b7e2bb2b317bf72b8f9b2b7a14bddfb  openssl-0.9.8zb-i486-1_slack13.1.txz\n92af0784eade0674332a56bfab73b97d  openssl-solibs-0.9.8zb-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\ndf5f961109d7b50971660ca6a7d4c48c  openssl-0.9.8zb-x86_64-1_slack13.1.txz\n582aaeae3d56730a2e1538a67d4e44da  openssl-solibs-0.9.8zb-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n546445d56d3b367fa0dd4e80859c4620  openssl-0.9.8zb-i486-1_slack13.37.txz\nb80e9df8cdd0649939ec2fab20d24691  openssl-solibs-0.9.8zb-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n9c9ce97dc21340924a3e27c1a8047023  openssl-0.9.8zb-x86_64-1_slack13.37.txz\n0fe1931f2fc82fb8d5fbe72680caf843  openssl-solibs-0.9.8zb-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\nd1580f4b22b99cee42b22276653c8180  openssl-1.0.1i-i486-1_slack14.0.txz\nec93cec2bcab8ae7391a504573cbc231  openssl-solibs-1.0.1i-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n329475de3759225b1d02aa7317b2eb58  openssl-1.0.1i-x86_64-1_slack14.0.txz\n25f2a198022d974534986a3913ca705c  openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n8336457bc31d44ebf502ffc4443f12f7  openssl-1.0.1i-i486-1_slack14.1.txz\n4b99ac357fbd3065c53367eea246b8c7  openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nf2b8f81d9d7dc02e5d1011f663ccc95d  openssl-1.0.1i-x86_64-1_slack14.1.txz\n4360abffbb57cb18ba0720f782d78250  openssl-solibs-1.0.1i-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n49ecd332a899cf742d3467a6efe44269  a/openssl-solibs-1.0.1i-i486-1.txz\n27da017c49045981b1793f105aff365f  n/openssl-1.0.1i-i486-1.txz\n\nSlackware x86_64 -current packages:\n8d74f3d770802182137c84d925f58cbc  a/openssl-solibs-1.0.1i-x86_64-1.txz\nfd9d94d3210f0aedf74959cb0887e2b8  n/openssl-1.0.1i-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1i-i486-1_slack14.1.txz openssl-solibs-1.0.1i-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list:                          |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message:                                                     |\n|                                                                        |\n|   unsubscribe slackware-security                                       |\n|                                                                        |\n| You will get a confirmation message back containing instructions to    |\n| complete the process.  Please do not reply to this email address. Relevant releases/architectures:\n\nRHEV-M 3.5 - noarch\n\n3. Description:\n\nRed Hat Enterprise Virtualization Manager provides access to virtual\nmachines using SPICE. These SPICE client packages provide the SPICE client\nand usbclerk service for both Windows 32-bit operating systems and Windows\n64-bit operating systems. (CVE-2014-3511)\n\nThis update also fixes the following bugs:\n\n* Previously, various clipboard managers, operating on the client or on the\nguest, would occasionally lose synchronization, which resulted in clipboard\ndata loss and the SPICE console freezing. Now, spice-gtk have been patched,\nsuch that clipboard synchronization does not freeze the SPICE console\nanymore. (BZ#1083489)\n\n* Prior to this update, when a SPICE console was launched from the Red Hat\nEnterprise Virtualization User Portal with the 'Native Client' invocation\nmethod and 'Open in Full Screen' selected, the displays of the guest\nvirtual machine were not always configured to match the client displays. \nAfter this update, the SPICE console will show a full-screen guest display\nfor each client monitor. (BZ#1076243)\n\n* A difference in behavior between Linux and Windows clients caused an\nextra nul character to be sent when pasting text in a guest machine from a\nWindows client. This invisible character was visible in some Java\napplications. With this update, the extra nul character is removed from\ntext strings and no more extraneous character would appear. (BZ#1090122)\n\n* Previously, If the clipboard is of type image/bmp, and the data is of 0\nsize, GTK+ will crash. With this update, the data size is checked first,\nand GTK+ no longer crashes when clipboard is of type image/bmp, and the\ndata is of 0 size. (BZ#1090433)\n\n* Modifier-only key combinations cannot be registered by users as hotkeys\nso if a user tries to set a modifier-only key sequence (for example,\n'ctrl+alt') as the hotkey for releasing the cursor, it will fail, and the\nuser will be able to release the cursor from the window. With this update,\nwhen a modifier-only hotkey is attempted to be registered, it will fall\nback to the default cursor-release sequence (which happens to be\n'ctrl+alt'). (BZ#985319)\n\n* Display configuration sometimes used outdated information about the\nposition of the remote-viewer windows in order to align and configure the\nguest displays. Occasionally, this caused the guest displays to became\nunexpectedly swapped when a window is resized. With this update,\nremote-viewer will always use the current window locations to align\ndisplays, rather than using a possibly outdated cached location\ninformation. Bugs fixed (https://bugzilla.redhat.com/):\n\n1018145 - --full-screen=auto-conf sometimes (but frequently) doesn't work correctly\n1018182 - primary monitor is switched if some screen gets bigger then current primary screen\n1076243 - [BUG] RHEV SPICE console not opening in full screen or detecting resolution by default\n1083489 - [SPICE][BUG] Spice session freezes randomly\n1090122 - Pasting into java apps inserts unprintable character\n1090433 - [GTK][BUG] win32: add more clipboard data checks to avoid crash\n1103366 - Rebase virt-viewer to 0.6.0\n1105650 - Fix windows productversion to fit -z releases\n1115445 - in About dialog, hyphen version-build dividing hyphen is missing\n1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext\n1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openssl security update\nAdvisory ID:       RHSA-2014:1052-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-1052.html\nIssue date:        2014-08-13\nCVE Names:         CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 \n                   CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 \n                   CVE-2014-3511 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nA race condition was found in the way OpenSSL handled ServerHello messages\nwith an included Supported EC Point Format extension. A malicious server\ncould possibly use this flaw to cause a multi-threaded TLS/SSL client using\nOpenSSL to write into freed memory, causing the client to crash or execute\narbitrary code. (CVE-2014-3509)\n\nIt was discovered that the OBJ_obj2txt() function could fail to properly\nNUL-terminate its output. This could possibly cause an application using\nOpenSSL functions to format fields of X.509 certificates to disclose\nportions of its memory. (CVE-2014-3508)\n\nA flaw was found in the way OpenSSL handled fragmented handshake packets. (CVE-2014-3511)\n\nMultiple flaws were discovered in the way OpenSSL handled DTLS packets. \nA remote attacker could use these flaws to cause a DTLS server or client\nusing OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505,\nCVE-2014-3506, CVE-2014-3507)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed a\nhandshake when using the anonymous Diffie-Hellman (DH) key exchange. A\nmalicious server could cause a DTLS client using OpenSSL to crash if that\nclient had anonymous DH cipher suites enabled. (CVE-2014-3510)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1127490 - CVE-2014-3508 openssl: information leak in pretty printing functions\n1127498 - CVE-2014-3509 openssl: race condition in ssl_parse_serverhello_tlsext\n1127499 - CVE-2014-3505 openssl: DTLS packet processing double free\n1127500 - CVE-2014-3506 openssl: DTLS memory exhaustion\n1127502 - CVE-2014-3507 openssl: DTLS memory leak from zero-length fragments\n1127503 - CVE-2014-3510 openssl: DTLS anonymous (EC)DH denial of service\n1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\n\nppc64:\nopenssl-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.ppc.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.s390.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.ppc64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.s390x.rpm\nopenssl-static-1.0.1e-16.el6_5.15.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nopenssl-1.0.1e-16.el6_5.15.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.i686.rpm\nopenssl-static-1.0.1e-16.el6_5.15.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm\nopenssl-static-1.0.1e-16.el6_5.15.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nppc64:\nopenssl-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.ppc64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.ppc.rpm\nopenssl-static-1.0.1e-34.el7_0.4.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.s390x.rpm\nopenssl-static-1.0.1e-34.el7_0.4.s390.rpm\nopenssl-static-1.0.1e-34.el7_0.4.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.4.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.4.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.4.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3505.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3506.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3507.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3508.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3509.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3510.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3511.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20140806.txt\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFT69raXlSAg2UNWIIRAiQAAKCbp6Iou4mHuootBfgs0jm7zP/wWACgt50C\npHXxupQnHYYH+zJFOmk5u8o=\n=DwUW\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nReferences:\n\nCVE-2014-3508\nCVE-2014-3509\nCVE-2014-3511\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\nCVE-2014-5139\nSSRT101894\nSSRT101916\nSSRT101918\nSSRT101920\nSSRT101921\nSSRT101922\nSSRT101923\nSSRT101925\nSSRT101926\nSSRT101927\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The HP Matrix\nOperating Environment v7.2.3 Update kit applicable to HP Matrix Operating\nEnvironment 7.2.x installations is available at the following location:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=HPID\n\nNOTE: Please read the readme.txt file before proceeding with the\ninstallation. \n\nDetailed descriptions of the vulnerabilities can be found at:\nhttps://www.openssl.org/news/secadv_20140806.txt\n\nIt's important that you upgrade the libssl1.0.0 package and not just\nthe openssl package. Alternatively, you may reboot your system. \n\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1.0.1e-2+deb7u12. \n\nFor the testing distribution (jessie), these problems will be fixed\nsoon. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.1i-1. \nCorrected:      2014-08-07 21:04:42 UTC (stable/10, 10.0-STABLE)\n                2014-09-09 10:09:46 UTC (releng/10.0, 10.0-RELEASE-p8)\n                2014-08-07 21:06:34 UTC (stable/9, 9.3-STABLE)\n                2014-09-09 10:13:46 UTC (releng/9.3, 9.3-RELEASE-p1)\n                2014-09-09 10:13:46 UTC (releng/9.2, 9.2-RELEASE-p11)\n                2014-09-09 10:13:46 UTC (releng/9.1, 9.1-RELEASE-p18)\n                2014-08-07 21:06:34 UTC (stable/8, 8.4-STABLE)\n                2014-09-09 10:13:46 UTC (releng/8.4, 8.4-RELEASE-p15)\nCVE Name:       CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3510,\n                CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>.   Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-5139]\n\nIII. \n\nIV.  Workaround\n\nNo workaround is available. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 9.2, 9.1, 8.4]\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:18/openssl-9.patch.asc\n# gpg --verify openssl-9.patch.asc\n\nb) Apply the patch.  Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. \n\nRestart all deamons using the library, or reboot the system. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI.  Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/8/                                                         r269687\nreleng/8.4/                                                       r271305\nstable/9/                                                         r269687\nreleng/9.1/                                                       r271305\nreleng/9.2/                                                       r271305\nreleng/9.3/                                                       r271305\nstable/10/                                                        r269686\nreleng/10.0/                                                      r271304\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII. \n\nA heap-based buffer overflow was found in glibc's\n__nss_hostname_digits_dots() function, which is used by the gethostbyname()\nand gethostbyname2() glibc function calls. (CVE-2015-0235)\n\nA race condition flaw was found in the way the Linux kernel's KVM subsystem\nhandled PIT (Programmable Interval Timer) emulation. A guest user who has \naccess to the PIT I/O ports could use this flaw to crash the host. (CVE-2014-3567)\n\nIt was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646)\n\nRed Hat would like to thank Qualys for reporting the CVE-2015-0235 issue,\nLars Bull of Google for reporting the CVE-2014-3611 issue, and the Advanced\nThreat Research team at Intel Security for reporting the CVE-2014-3645 and\nCVE-2014-3646 issues. Bugs fixed (https://bugzilla.redhat.com/):\n\n1127504 - CVE-2014-3511 openssl: TLS protocol downgrade attack\n1144825 - CVE-2014-3646 kernel: kvm: vmx: invvpid vm exit not handled\n1144835 - CVE-2014-3645 kernel: kvm: vmx: invept vm exit not handled\n1144878 - CVE-2014-3611 kernel: kvm: PIT timer race condition\n1152563 - Tracker: RHEV-H 6.6 for RHEV 3.4.z build\n1152961 - CVE-2014-3567 openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash\n1180044 - Incorrect glusterfs package in to RHEVH 6.6 for 3.4.4 and 3.5 build [rhev-3.4.z]\n1183461 - CVE-2015-0235 glibc: __nss_hostname_digits_dots() heap-based buffer overflow\n1185720 - Incorrect rhn-virtualization-host and rhn-virtualization-common packages in RHEVH 6.6 for rhev 3.4.5\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04512909\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04512909\nVersion: 2\n\nHPSBMU03216 rev.2 - HP Service Manager running SSLv3, Multiple Remote\nVulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-01-22\nLast Updated: 2015-01-23\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized\naccess, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Service\nManager running SSLv3. The vulnerabilities could be exploited remotely\nresulting in Denial of Service (DoS), unauthorized access or disclosure of\ninformation. \n\nReferences:\n\nCVE-2014-0224 Remote Unauthorized Access, Disclosure of Information\nCVE-2014-3509 Remote Denial of Service (DoS)\nCVE-2014-3511 Remote Unauthorized Access, Disclosure of Information\nCVE-2014-5139 Remote Denial of Service (DoS)\nSSRT101818\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nServiceCenter 6.2\n\nService Manager 7.10\n\nService Manager 7.11\n\nService Manager 9.20\n\nService Manager 9.21\n\nService Manager 9.30\n\nService Manager 9.31\n\nService Manager 9.32\n\nService Manager 9.33\n\nService Manager 9.34\n\nNote: not impacted by CVE-2014-0224\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3509    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8\nCVE-2014-3511    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2014-5139    (AV:N/AC:M/Au:N/C:N/I:N/A:P)       4.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has released the following software updates for HP Service Manager to\nresolve these vulnerabilities. \nNote: For versions not listed, please contact support:\n\nNote: ServiceCenter 6.2 is impacted only if using the Directory Services\nintegration feature with the SC LDAP over SSL (LDAPS) protocol. If this\nfeature is in use, HP recommends that ServiceCenter 6.2 customers upgrade to\nService Manager 7.11, 9.21, or 9.34, and then apply the patches listed below. \n\nPatch Version\n Package Name / SSO URL\n\nSM711P22\n AIX Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00614\n\nHP Itanium Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00615\n\nHP parisc Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00616\n\nLinux x86 Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00617\n\nSolaris Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00618\n\nWindows Server 7.11.720 p22\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00619\n\nSM921P9\n AIX server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00621\n\nHPUX/IA server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00622\n\nHPUX/PA server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00623\n\nLinux server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00624\n\nSolaris server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00625\n\nWindows server 9.21.706 P9\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00626\n\nSM934P2\n AIX Server 9.34.2003 p2\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00605\n\nHP Itanium Server 9.34.2003 p2\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00606\n\nLinux Server 9.34.2003 p2\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00607\n\nSolaris Server 9.34.2003 p2\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00608\n\nWindows Server 9.34.2003 p2\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse\narch/document/LID/HPSM_00609\n\nHISTORY\nVersion:1 (rev.1) - 22 January 2015 Initial release\nVersion:2 (rev.2) - 23 January 2015 added note for versions not listed in\ntable. \n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. OpenSSL Security Advisory [6 Aug 2014]\n========================================\n\nInformation leak in pretty printing functions (CVE-2014-3508)\n=============================================================\n\nA flaw in OBJ_obj2txt may cause pretty printing functions such as\nX509_name_oneline, X509_name_print_ex et al. to leak some information from the\nstack. Applications may be affected if they echo pretty printing output to the\nattacker. OpenSSL SSL/TLS clients and servers themselves are not affected. \n\nOpenSSL 0.9.8 users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 users should upgrade to 1.0.1i. \n\nThanks to Ivan Fratric (Google) for discovering this issue. This issue\nwas reported to OpenSSL on 19th June 2014. \n\nThe fix was developed by Emilia Käsper and Stephen Henson of the OpenSSL\ndevelopment team. This can\nbe exploited through a Denial of Service attack. \n\nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 2nd July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nOpenSSL 1.0.0 SSL/TLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 SSL/TLS client users should upgrade to 1.0.1i. \n\nThanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this\nissue. This issue was reported to OpenSSL on 8th July 2014. \n\nThe fix was developed by Gabor Tyukasz. \n\n\nDouble Free when processing DTLS packets (CVE-2014-3505)\n========================================================\n\nAn attacker can force an error condition which causes openssl to crash whilst\nprocessing DTLS packets due to memory being freed twice. This can be exploited\nthrough a Denial of Service attack. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i. \n\nThanks to Adam Langley and Wan-Teh Chang (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 6th June\n2014. \n\nThe fix was developed by Adam Langley. This can be exploited through a Denial of\nService attack. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. This can be exploited through a Denial of Service attack. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1i. \n\nThanks to Adam Langley (Google) for discovering and researching this\nissue. This issue was reported to OpenSSL on 6th June 2014. \n\nThe fix was developed by Adam Langley. \n\nOpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)\n===============================================================\n\nOpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a\ndenial of service attack. A malicious server can crash the client with a null\npointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and\nsending carefully crafted handshake messages. \n\nOpenSSL 0.9.8 DTLS client users should upgrade to 0.9.8zb\nOpenSSL 1.0.0 DTLS client users should upgrade to 1.0.0n. \nOpenSSL 1.0.1 DTLS client users should upgrade to 1.0.1i. \n\nThanks to Felix Gröbert (Google) for discovering and researching this issue. \nThis issue was reported to OpenSSL on 18th July 2014. \n\nThe fix was developed by Emilia Käsper of the OpenSSL development team. \n\nOpenSSL 1.0.1 SSL/TLS server users should upgrade to 1.0.1i. \n\nThanks to David Benjamin and Adam Langley (Google) for discovering and\nresearching this issue. This issue was reported to OpenSSL on 21st July 2014. \n\nThe fix was developed by David Benjamin. \n\n\nSRP buffer overrun (CVE-2014-3512)\n==================================\n\nA malicious client or server can send invalid SRP parameters and overrun\nan internal buffer. Only applications which are explicitly set up for SRP\nuse are affected. \n\nOpenSSL 1.0.1 SSL/TLS users should upgrade to 1.0.1i. \n\nThanks to Sean Devlin and Watson Ladd (Cryptography Services, NCC\nGroup) for discovering this issue. This issue was reported to OpenSSL\non 31st July 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20140806.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time",
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "PACKETSTORM",
            id: "132080",
         },
         {
            db: "PACKETSTORM",
            id: "130359",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "130299",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2014-3511",
            trust: 3.5,
         },
         {
            db: "BID",
            id: "69079",
            trust: 1.4,
         },
         {
            db: "SECUNIA",
            id: "59700",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61100",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60803",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59710",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60810",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60917",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61017",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60921",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60221",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60022",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60938",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61139",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61043",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59756",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61959",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "58962",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61775",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60377",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60684",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "61184",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "59887",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60890",
            trust: 1.1,
         },
         {
            db: "SECUNIA",
            id: "60493",
            trust: 1.1,
         },
         {
            db: "SECTRACK",
            id: "1030693",
            trust: 1.1,
         },
         {
            db: "TENABLE",
            id: "TNS-2014-06",
            trust: 1.1,
         },
         {
            db: "MCAFEE",
            id: "SB10084",
            trust: 1.1,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.0696",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
            trust: 0.6,
         },
         {
            db: "JUNIPER",
            id: "JSA10649",
            trust: 0.3,
         },
         {
            db: "VULMON",
            id: "CVE-2014-3511",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "169648",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130299",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130868",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130241",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "128214",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127803",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130815",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "131014",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132467",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127861",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132085",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "137201",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "130359",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "132080",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "127811",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "130299",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "130359",
         },
         {
            db: "PACKETSTORM",
            id: "132080",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   id: "VAR-201408-0081",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.45272481500000006,
   },
   last_update_date: "2024-11-28T21:33:29.470000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "openssl-1.0.1i",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51696",
         },
         {
            title: "openssl-1.0.0n",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51695",
         },
         {
            title: "openssl-0.9.8zb",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51694",
         },
         {
            title: "Red Hat: Critical: rhev-hypervisor6 security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20150126 - Security Advisory",
         },
         {
            title: "Tenable Security Advisories: [R4] Tenable Products Affected by OpenSSL Protocol Downgrade Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-06",
         },
         {
            title: "Ubuntu Security Notice: openssl vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2308-1",
         },
         {
            title: "Debian Security Advisories: DSA-2998-1 openssl -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=bfd576c692d8814b2a331baf29ad367c",
         },
         {
            title: "Amazon Linux AMI: ALAS-2014-391",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-391",
         },
         {
            title: "Symantec Security Advisories: SA85 : OpenSSL Security Advisory 06-Aug-2014",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=02a206cf2efb06aecdaf29aeca851b55",
         },
         {
            title: "Splunk Security Announcements: Splunk Enterprise 6.1.4 and 5.0.10 address four vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=splunk_security_announcements&qid=f5716086497f074005596fe8e0bc5dce",
         },
         {
            title: "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc",
         },
         {
            title: "oval",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/oval ",
         },
         {
            title: "wormhole",
            trust: 0.1,
            url: "https://github.com/jumanjihouse/wormhole ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://www.openssl.org/news/secadv_20140806.txt",
         },
         {
            trust: 1.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3511",
         },
         {
            trust: 1.4,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
         },
         {
            trust: 1.4,
            url: "https://support.citrix.com/article/ctx216642",
         },
         {
            trust: 1.4,
            url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:18.openssl.asc",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3509",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0126.html",
         },
         {
            trust: 1.2,
            url: "http://rhn.redhat.com/errata/rhsa-2015-0197.html",
         },
         {
            trust: 1.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3508",
         },
         {
            trust: 1.1,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-008.txt.asc",
         },
         {
            trust: 1.1,
            url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 1.1,
            url: "http://linux.oracle.com/errata/elsa-2014-1052.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html",
         },
         {
            trust: 1.1,
            url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html",
         },
         {
            trust: 1.1,
            url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/58962",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59700",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59710",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59756",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/59887",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60022",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60221",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60377",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60493",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60684",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60803",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60810",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60890",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60917",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60921",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/60938",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61017",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61043",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61100",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61139",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61184",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61775",
         },
         {
            trust: 1.1,
            url: "http://secunia.com/advisories/61959",
         },
         {
            trust: 1.1,
            url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
         },
         {
            trust: 1.1,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html",
         },
         {
            trust: 1.1,
            url: "http://www.arubanetworks.com/support/alerts/aid-08182014.txt",
         },
         {
            trust: 1.1,
            url: "http://www.debian.org/security/2014/dsa-2998",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/69079",
         },
         {
            trust: 1.1,
            url: "http://www.securitytracker.com/id/1030693",
         },
         {
            trust: 1.1,
            url: "http://www.splunk.com/view/sp-caaanhs",
         },
         {
            trust: 1.1,
            url: "http://www.tenable.com/security/tns-2014-06",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 1.1,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 1.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127504",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95162",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888",
         },
         {
            trust: 1.1,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10084",
         },
         {
            trust: 1.1,
            url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-september/000196.html",
         },
         {
            trust: 1.1,
            url: "https://techzone.ergon.ch/cve-2014-3511",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-5139",
         },
         {
            trust: 1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=280b1f1ad12131defcd986676a8fc9717aaa601b",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/",
         },
         {
            trust: 0.7,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/",
         },
         {
            trust: 0.7,
            url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3567",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3510",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3507",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3506",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3566",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3513",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3568",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.0696",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3512",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3505",
         },
         {
            trust: 0.5,
            url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_",
         },
         {
            trust: 0.5,
            url: "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber",
         },
         {
            trust: 0.4,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1052.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682663",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021317",
         },
         {
            trust: 0.3,
            url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wan_boot",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684903",
         },
         {
            trust: 0.3,
            url: "http://openssl.org/",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004917",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=swg21686583",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096266",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004931",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686126",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004872",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691210",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/mar/84",
         },
         {
            trust: 0.3,
            url: "http://seclists.org/bugtraq/2015/feb/151",
         },
         {
            trust: 0.3,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10649&cat=sirt_1&actp=list",
         },
         {
            trust: 0.3,
            url: "aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
         },
         {
            trust: 0.3,
            url: "https://downloads.avaya.com/css/p8/documents/100182969",
         },
         {
            trust: 0.3,
            url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512909",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21684570",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685467",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21682293",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097658",
         },
         {
            trust: 0.3,
            url: "https://rhn.redhat.com/errata/rhsa-2014-1054.html",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21684913",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691014",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020240",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21715901",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691005",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21963783",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21683389",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097903",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098264",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682034",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098252",
         },
         {
            trust: 0.3,
            url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098585",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21689886",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686182",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682016",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685967",
         },
         {
            trust: 0.3,
            url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096510",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687099",
         },
         {
            trust: 0.3,
            url: "https://www-304.ibm.com/support/docview.wss?uid=swg21691162",
         },
         {
            trust: 0.3,
            url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html?ref=rss",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21966557",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683744",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.3,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.3,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2009-3555",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2014-3511",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.2,
            url: "http://www.debian.org/security/",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/viewalert.x?alertid=35208",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/2308-1/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0224",
         },
         {
            trust: 0.1,
            url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-0160",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0235",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/updates/classification/#critical",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3567",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3611",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/ht",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3646",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3611",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3645",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3645",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3646",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-0235",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512>",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/makeworld.html>.",
         },
         {
            trust: 0.1,
            url: "https://www.openssl.org/news/secadv_20140806.txt>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/>.",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/advisories/freebsd-sa-14:18.openssl.asc>",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509>",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-10.0.patch.asc",
         },
         {
            trust: 0.1,
            url: "http://security.freebsd.org/patches/sa-14:18/openssl-9.3.patch",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139>",
         },
         {
            trust: 0.1,
            url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>",
         },
         {
            trust: 0.1,
            url: "http://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "http://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04486577-1",
         },
         {
            trust: 0.1,
            url: "https://technet.microsoft.com/library/security/3009008",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3509.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3505.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3506.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3508.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3507.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3511.html",
         },
         {
            trust: 0.1,
            url: "https://www.redhat.com/security/data/cve/cve-2014-3510.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/team/key/#package",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1790",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/info/insightmanagement",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2019",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0705",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1788",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1792",
         },
         {
            trust: 0.1,
            url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085",
         },
         {
            trust: 0.1,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-0799",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2020",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2018",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1789",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2022",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1791",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2017",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-7501",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2027",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-6565",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-0205",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-3194",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2026",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2014-3569",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-2021",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "http://slackware.com",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3510",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3509",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3511",
         },
         {
            trust: 0.1,
            url: "http://slackware.com/gpg-key",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3506",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3512",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3505",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3508",
         },
         {
            trust: 0.1,
            url: "http://osuosl.org)",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5139",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3507",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "130299",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "130359",
         },
         {
            db: "PACKETSTORM",
            id: "132080",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            db: "BID",
            id: "69079",
         },
         {
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            db: "PACKETSTORM",
            id: "130299",
         },
         {
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            db: "PACKETSTORM",
            id: "130359",
         },
         {
            db: "PACKETSTORM",
            id: "132080",
         },
         {
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-08-13T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            date: "2014-08-06T00:00:00",
            db: "BID",
            id: "69079",
         },
         {
            date: "2014-08-06T12:12:12",
            db: "PACKETSTORM",
            id: "169648",
         },
         {
            date: "2015-02-09T21:09:18",
            db: "PACKETSTORM",
            id: "130299",
         },
         {
            date: "2015-03-18T00:44:34",
            db: "PACKETSTORM",
            id: "130868",
         },
         {
            date: "2015-02-04T21:32:57",
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            date: "2014-09-09T17:32:22",
            db: "PACKETSTORM",
            id: "128214",
         },
         {
            date: "2014-08-08T21:50:05",
            db: "PACKETSTORM",
            id: "127803",
         },
         {
            date: "2015-03-13T17:11:00",
            db: "PACKETSTORM",
            id: "130815",
         },
         {
            date: "2015-03-25T00:42:25",
            db: "PACKETSTORM",
            id: "131014",
         },
         {
            date: "2015-06-29T15:35:42",
            db: "PACKETSTORM",
            id: "132467",
         },
         {
            date: "2014-08-14T02:24:57",
            db: "PACKETSTORM",
            id: "127861",
         },
         {
            date: "2015-05-29T23:37:43",
            db: "PACKETSTORM",
            id: "132085",
         },
         {
            date: "2016-05-26T09:22:00",
            db: "PACKETSTORM",
            id: "137201",
         },
         {
            date: "2015-02-12T00:29:07",
            db: "PACKETSTORM",
            id: "130359",
         },
         {
            date: "2015-05-29T23:37:04",
            db: "PACKETSTORM",
            id: "132080",
         },
         {
            date: "2014-08-11T11:11:00",
            db: "PACKETSTORM",
            id: "127811",
         },
         {
            date: "2014-08-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            date: "2014-08-13T23:55:07.623000",
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-11-15T00:00:00",
            db: "VULMON",
            id: "CVE-2014-3511",
         },
         {
            date: "2016-09-09T15:00:00",
            db: "BID",
            id: "69079",
         },
         {
            date: "2022-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
         {
            date: "2024-11-21T02:08:16.303000",
            db: "NVD",
            id: "CVE-2014-3511",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "130241",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSL Security hole",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201408-125",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "69079",
         },
      ],
      trust: 0.3,
   },
}

cve-2018-1720
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 16:42
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 147294.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:07:44.376Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880601",
               },
               {
                  name: "ibm-sterling-cve20181720-info-disc (147294)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147294",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.3_6",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 147294.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:H/I:N/UI:N/A:N/AV:N/PR:N/S:U/AC:H/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880601",
            },
            {
               name: "ibm-sterling-cve20181720-info-disc (147294)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147294",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2018-1720",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.3_6",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.1, 5.2.6.3_6, 6.0.0.0, and 6.0.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 147294.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880601",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880601 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880601",
                  },
                  {
                     name: "ibm-sterling-cve20181720-info-disc (147294)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147294",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1720",
      datePublished: "2019-04-25T14:36:43.298733Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T16:42:31.465Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4657
Vulnerability from cvelistv5
Published
2020-12-16 20:35
Modified
2024-09-17 01:52
Summary
IBM Sterling B2B Integrator 5.2.0.0 through 6.0.3.2 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186094.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.102Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6382414",
               },
               {
                  name: "ibm-sterling-cve20204657-xss (186094)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186094",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.0.3.2 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186094.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.8,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/I:L/A:N/C:L/PR:N/S:C/AC:L/AV:N/UI:R/E:H/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-12-16T20:35:25",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6382414",
            },
            {
               name: "ibm-sterling-cve20204657-xss (186094)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186094",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-12-15T00:00:00",
               ID: "CVE-2020-4657",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.0.3.2 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186094.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "N",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6382414",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6382414 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6382414",
                  },
                  {
                     name: "ibm-sterling-cve20204657-xss (186094)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186094",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4657",
      datePublished: "2020-12-16T20:35:26.059366Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T01:52:01.995Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-38954
Vulnerability from cvelistv5
Published
2022-06-30 16:50
Modified
2024-09-16 22:14
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could disclose sensitive version information that could aid in future attacks against the system. IBM X-Force ID: 211414.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:51:20.695Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6599607",
               },
               {
                  name: "ibm-sterling-cve202138954-info-disc (211414)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/211414",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
               ],
            },
         ],
         datePublic: "2022-06-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could disclose sensitive version information that could aid in future attacks against the system. IBM X-Force ID: 211414.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/UI:N/I:N/PR:L/AV:N/S:U/AC:L/C:L/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-30T16:50:20",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6599607",
            },
            {
               name: "ibm-sterling-cve202138954-info-disc (211414)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/211414",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-06-29T00:00:00",
               ID: "CVE-2021-38954",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could disclose sensitive version information that could aid in future attacks against the system. IBM X-Force ID: 211414.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6599607",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6599607 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6599607",
                  },
                  {
                     name: "ibm-sterling-cve202138954-info-disc (211414)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/211414",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-38954",
      datePublished: "2022-06-30T16:50:20.126836Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-16T22:14:32.245Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29761
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 23:36
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information from the dashboard that they should not have access to. IBM X-Force ID: 202265.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.182Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495969",
               },
               {
                  name: "ibm-sterling-cve202129761-info-disc (202265)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202265",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information from the dashboard that they should not have access to. IBM X-Force ID: 202265.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/PR:L/A:N/C:L/AC:L/S:U/UI:N/I:N/AV:N/RL:O/E:U/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:34",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495969",
            },
            {
               name: "ibm-sterling-cve202129761-info-disc (202265)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202265",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29761",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information from the dashboard that they should not have access to. IBM X-Force ID: 202265.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495969",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495969 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495969",
                  },
                  {
                     name: "ibm-sterling-cve202129761-info-disc (202265)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202265",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29761",
      datePublished: "2021-10-06T17:10:34.695505Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-16T23:36:24.490Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1496
Vulnerability from cvelistv5
Published
2017-07-31 21:00
Modified
2024-09-17 02:51
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128694.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.658Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128694",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22006175",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-07-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128694.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-31T20:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128694",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22006175",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2017-07-24T00:00:00",
               ID: "CVE-2017-1496",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128694.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128694",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128694",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22006175",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22006175",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1496",
      datePublished: "2017-07-31T21:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-17T02:51:46.667Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4312
Vulnerability from cvelistv5
Published
2020-05-13 12:35
Modified
2024-09-16 20:13
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 trough 6.0.3.1 could allow an authenticated user to obtain sensitive information from a cached web page. IBM X-Force ID: 177089.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:00:07.114Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6208046",
               },
               {
                  name: "ibm-sterling-cve20204312-info-disc (177089)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/177089",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.1",
                  },
               ],
            },
         ],
         datePublic: "2020-05-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 trough 6.0.3.1 could allow an authenticated user to obtain sensitive information from a cached web page. IBM X-Force ID: 177089.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/PR:L/A:N/UI:N/C:L/S:U/I:N/AC:L/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-13T12:35:12",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6208046",
            },
            {
               name: "ibm-sterling-cve20204312-info-disc (177089)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/177089",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-05-12T00:00:00",
               ID: "CVE-2020-4312",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 trough 6.0.3.1 could allow an authenticated user to obtain sensitive information from a cached web page. IBM X-Force ID: 177089.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6208046",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6208046 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6208046",
                  },
                  {
                     name: "ibm-sterling-cve20204312-info-disc (177089)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/177089",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4312",
      datePublished: "2020-05-13T12:35:12.324004Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T20:13:13.360Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-34330
Vulnerability from cvelistv5
Published
2023-01-04 17:07
Modified
2024-08-03 09:07
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229469.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:07:16.067Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6852469",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/229469",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThan: "6.1.2.1",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  229469.",
                  },
               ],
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  229469.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-05T05:58:57.684130Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/6852469",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/229469",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator cross-site scripting",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2022-34330",
      datePublished: "2023-01-04T17:07:29.311Z",
      dateReserved: "2022-06-22T19:42:48.457Z",
      dateUpdated: "2024-08-03T09:07:16.067Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1131
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:25
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information by using unsupported, specially crafted HTTP commands. IBM X-Force ID: 121375.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:25:17.392Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99227",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99227",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004270",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information by using unsupported, specially crafted HTTP commands. IBM X-Force ID: 121375.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99227",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99227",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004270",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1131",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information by using unsupported, specially crafted HTTP commands. IBM X-Force ID: 121375.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99227",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99227",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004270",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004270",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121375",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1131",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:25:17.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-39085
Vulnerability from cvelistv5
Published
2022-08-16 18:45
Modified
2024-09-17 00:42
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:58:17.201Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6612505",
               },
               {
                  name: "ibm-sterling-cve202139085-sql-injection (215888)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/215888",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.1",
                  },
               ],
            },
         ],
         datePublic: "2022-08-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/I:L/A:L/UI:N/AC:L/AV:N/C:L/S:U/PR:L/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-08-16T18:45:33",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6612505",
            },
            {
               name: "ibm-sterling-cve202139085-sql-injection (215888)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/215888",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-08-15T00:00:00",
               ID: "CVE-2021-39085",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                       {
                                          version_value: "6.1.0.4",
                                       },
                                       {
                                          version_value: "6.1.1.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6612505",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6612505 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6612505",
                  },
                  {
                     name: "ibm-sterling-cve202139085-sql-injection (215888)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/215888",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-39085",
      datePublished: "2022-08-16T18:45:33.266571Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-17T00:42:18.234Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4299
Vulnerability from cvelistv5
Published
2020-05-14 15:50
Modified
2024-09-16 19:41
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 could expose sensitive information to a user through a specially crafted HTTP request. IBM X-Force ID: 176606.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:00:07.356Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6208041",
               },
               {
                  name: "ibm-sterling-cve20204299-info-disc (176606)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/176606",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.1",
                  },
               ],
            },
         ],
         datePublic: "2020-05-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 could expose sensitive information to a user through a specially crafted HTTP request. IBM X-Force ID: 176606.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/S:U/UI:N/AV:N/A:N/PR:L/C:L/AC:L/I:N/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-14T15:50:44",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6208041",
            },
            {
               name: "ibm-sterling-cve20204299-info-disc (176606)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/176606",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-05-13T00:00:00",
               ID: "CVE-2020-4299",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 could expose sensitive information to a user through a specially crafted HTTP request. IBM X-Force ID: 176606.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6208041",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6208041 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6208041",
                  },
                  {
                     name: "ibm-sterling-cve20204299-info-disc (176606)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/176606",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4299",
      datePublished: "2020-05-14T15:50:44.609029Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T19:41:14.881Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-32341
Vulnerability from cvelistv5
Published
2024-02-09 00:58
Modified
2024-08-02 15:10
Summary
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-32341",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-09T20:53:10.397461Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:20:49.401Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:10:24.887Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7116081",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/255827",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.8",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.3",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption.  IBM X-Force ID:  255827.",
                  },
               ],
               value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption.  IBM X-Force ID:  255827.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400 Uncontrolled Resource Consumption",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-09T00:58:25.772Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7116081",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/255827",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator denial of service",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2023-32341",
      datePublished: "2024-02-09T00:58:25.772Z",
      dateReserved: "2023-05-08T18:32:52.654Z",
      dateUpdated: "2024-08-02T15:10:24.887Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-9982
Vulnerability from cvelistv5
Published
2017-06-22 18:00
Modified
2024-08-06 03:07
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information such as account lists due to improper access control. IBM X-Force ID: 120274.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T03:07:31.374Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99197",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99197",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120274",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information such as account lists due to improper access control. IBM X-Force ID: 120274.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-23T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99197",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99197",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120274",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2016-9982",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user to obtain sensitive information such as account lists due to improper access control. IBM X-Force ID: 120274.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99197",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99197",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120274",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120274",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2016-9982",
      datePublished: "2017-06-22T18:00:00",
      dateReserved: "2016-12-16T00:00:00",
      dateUpdated: "2024-08-06T03:07:31.374Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22482
Vulnerability from cvelistv5
Published
2022-05-17 16:25
Modified
2024-09-16 19:46
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow an authenticated user to upload files that could fill up the filesystem and cause a denial of service. IBM X-Force ID: 225977.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:14:55.323Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6586576",
               },
               {
                  name: "ibm-sterling-cve202222482-dos (225977)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/225977",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
               ],
            },
         ],
         datePublic: "2022-05-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow an authenticated user to upload files that could fill up the filesystem and cause a denial of service. IBM X-Force ID: 225977.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/PR:L/A:H/C:N/AV:N/I:N/S:U/UI:N/AC:L/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-17T16:25:24",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6586576",
            },
            {
               name: "ibm-sterling-cve202222482-dos (225977)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/225977",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-05-16T00:00:00",
               ID: "CVE-2022-22482",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow an authenticated user to upload files that could fill up the filesystem and cause a denial of service. IBM X-Force ID: 225977.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "H",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6586576",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6586576 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6586576",
                  },
                  {
                     name: "ibm-sterling-cve202222482-dos (225977)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/225977",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2022-22482",
      datePublished: "2022-05-17T16:25:24.741344Z",
      dateReserved: "2022-01-03T00:00:00",
      dateUpdated: "2024-09-16T19:46:55.549Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4258
Vulnerability from cvelistv5
Published
2019-05-01 15:15
Modified
2024-09-16 22:25
Summary
IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159946.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:33:37.965Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194258-xss (159946)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159946",
               },
               {
                  name: "108188",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108188",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159946.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/I:L/PR:L/S:C/UI:R/C:L/A:N/AV:N/AC:L/RL:O/RC:C/E:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-08T15:08:08",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194258-xss (159946)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159946",
            },
            {
               name: "108188",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108188",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-29T00:00:00",
               ID: "CVE-2019-4258",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159946.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "http://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194258-xss (159946)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159946",
                  },
                  {
                     name: "108188",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108188",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4258",
      datePublished: "2019-05-01T15:15:20.930264Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T22:25:25.961Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1348
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:32
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126524.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.955Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99245",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99245",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126524",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126524.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99245",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99245",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126524",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1348",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126524.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99245",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99245",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126524",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126524",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1348",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:32:29.955Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4075
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 21:02
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157109.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.970Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194075-xss (157109)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157109",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157109.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AC:L/S:C/PR:L/A:N/AV:N/UI:R/I:L/C:L/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194075-xss (157109)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157109",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4075",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157109.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194075-xss (157109)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157109",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4075",
      datePublished: "2019-04-25T14:36:43.541469Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T21:02:52.441Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29758
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 19:56
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to perform actions that they should not be able to access due to improper access controls. IBM X-Force ID: 202169.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:02.494Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495969",
               },
               {
                  name: "ibm-sterling-cve202129758-access-control (202169)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202169",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to perform actions that they should not be able to access due to improper access controls. IBM X-Force ID: 202169.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:N/AC:L/S:U/I:L/AV:N/UI:N/PR:L/A:N/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:31",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495969",
            },
            {
               name: "ibm-sterling-cve202129758-access-control (202169)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202169",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29758",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to perform actions that they should not be able to access due to improper access controls. IBM X-Force ID: 202169.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495969",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495969 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495969",
                  },
                  {
                     name: "ibm-sterling-cve202129758-access-control (202169)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202169",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29758",
      datePublished: "2021-10-06T17:10:31.485872Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-16T19:56:42.709Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-38925
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 21:08
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:51:20.870Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495905",
               },
               {
                  name: "ibm-sterling-cve202138925-info-disc (210171)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/210171",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:H/AC:H/S:U/I:N/AV:N/UI:N/PR:N/A:N/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:45",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495905",
            },
            {
               name: "ibm-sterling-cve202138925-info-disc (210171)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/210171",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-38925",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495905",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495905 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495905",
                  },
                  {
                     name: "ibm-sterling-cve202138925-info-disc (210171)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/210171",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-38925",
      datePublished: "2021-10-06T17:10:45.850313Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-16T21:08:56.389Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4597
Vulnerability from cvelistv5
Published
2020-02-26 15:55
Modified
2024-09-16 16:13
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:48.043Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/3145401",
               },
               {
                  name: "ibm-sterling-cve20194597-sql-injection (167880)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167880",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
               ],
            },
         ],
         datePublic: "2020-02-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AC:L/S:U/AV:N/I:L/PR:L/C:L/A:L/UI:N/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-26T15:55:23",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/3145401",
            },
            {
               name: "ibm-sterling-cve20194597-sql-injection (167880)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167880",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-02-25T00:00:00",
               ID: "CVE-2019-4597",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/3145401",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 3145401 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/3145401",
                  },
                  {
                     name: "ibm-sterling-cve20194597-sql-injection (167880)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167880",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4597",
      datePublished: "2020-02-26T15:55:23.841299Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T16:13:12.009Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35638
Vulnerability from cvelistv5
Published
2023-11-22 04:00
Modified
2024-11-21 18:56
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 230824.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:36:44.396Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7080104",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/230824",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-35638",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-21T18:55:40.676569Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-21T18:56:11.554Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.8",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.1",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.  IBM X-Force ID:  230824.",
                  },
               ],
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.  IBM X-Force ID:  230824.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-352",
                     description: "CWE-352 Cross-Site Request Forgery (CSRF)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-22T04:00:15.625Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7080104",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/230824",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator cross-site request forgery",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2022-35638",
      datePublished: "2023-11-22T04:00:15.625Z",
      dateReserved: "2022-07-11T18:50:45.487Z",
      dateUpdated: "2024-11-21T18:56:11.554Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4387
Vulnerability from cvelistv5
Published
2019-11-26 15:46
Modified
2024-09-17 02:26
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 162715.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:33:38.285Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/1115109",
               },
               {
                  name: "ibm-sterling-cve20194387-sql-injection (162175)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162175",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.2.0",
                  },
               ],
            },
         ],
         datePublic: "2019-11-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 162715.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/PR:L/I:L/C:L/S:U/AV:N/UI:N/A:L/AC:L/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-26T15:46:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/1115109",
            },
            {
               name: "ibm-sterling-cve20194387-sql-injection (162175)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162175",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-11-25T00:00:00",
               ID: "CVE-2019-4387",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.2.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 162715.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/1115109",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 1115109 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/1115109",
                  },
                  {
                     name: "ibm-sterling-cve20194387-sql-injection (162175)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162175",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4387",
      datePublished: "2019-11-26T15:46:18.539212Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T02:26:29.221Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1633
Vulnerability from cvelistv5
Published
2018-07-20 16:00
Modified
2024-09-17 00:10
Summary
IBM Sterling B2B Integrator 5.2 through 5.2.6 could allow an authenticated attacker to obtain sensitive variable name information using specially crafted HTTP requests. IBM X-Force ID: 133180.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:39:32.041Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
               },
               {
                  name: "104927",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104927",
               },
               {
                  name: "ibm-sterling-cve20171633-info-disc(133180)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/133180",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2018-07-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2 through 5.2.6 could allow an authenticated attacker to obtain sensitive variable name information using specially crafted HTTP requests. IBM X-Force ID: 133180.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:N/PR:L/S:U/UI:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-01T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
            },
            {
               name: "104927",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104927",
            },
            {
               name: "ibm-sterling-cve20171633-info-disc(133180)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/133180",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-07-17T00:00:00",
               ID: "CVE-2017-1633",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2 through 5.2.6 could allow an authenticated attacker to obtain sensitive variable name information using specially crafted HTTP requests. IBM X-Force ID: 133180.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                  },
                  {
                     name: "104927",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104927",
                  },
                  {
                     name: "ibm-sterling-cve20171633-info-disc(133180)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/133180",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1633",
      datePublished: "2018-07-20T16:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-17T00:10:40.237Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1800
Vulnerability from cvelistv5
Published
2018-09-20 15:00
Modified
2024-09-16 17:48
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 and 6.2.6.1 could allow a local user to obtain highly sensitive information during a short time period when installation is occurring. IBM X-Force ID: 149607.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:14:38.406Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ibm-sterling-cve20181800-info-disc(149607)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.6.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.0",
                  },
               ],
            },
         ],
         datePublic: "2018-09-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 and 6.2.6.1 could allow a local user to obtain highly sensitive information during a short time period when installation is occurring. IBM X-Force ID: 149607.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 4.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/AC:H/AV:L/C:H/I:N/PR:N/S:U/UI:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-11-16T20:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "ibm-sterling-cve20181800-info-disc(149607)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-09-13T00:00:00",
               ID: "CVE-2018-1800",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.6.3",
                                       },
                                       {
                                          version_value: "5.2.6.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 and 6.2.6.1 could allow a local user to obtain highly sensitive information during a short time period when installation is occurring. IBM X-Force ID: 149607.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "L",
                     C: "H",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ibm-sterling-cve20181800-info-disc(149607)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1800",
      datePublished: "2018-09-20T15:00:00Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T17:48:58.826Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1174
Vulnerability from cvelistv5
Published
2017-08-10 15:00
Modified
2024-09-16 20:42
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 123296.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:25:17.352Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004268",
               },
               {
                  name: "100246",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/100246",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123296",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-08-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 123296.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-11T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004268",
            },
            {
               name: "100246",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/100246",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123296",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2017-08-09T00:00:00",
               ID: "CVE-2017-1174",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 123296.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004268",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004268",
                  },
                  {
                     name: "100246",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/100246",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123296",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123296",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1174",
      datePublished: "2017-08-10T15:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-16T20:42:40.586Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-39033
Vulnerability from cvelistv5
Published
2022-04-19 16:15
Modified
2024-09-16 23:31
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 213963.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:58:17.214Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6573049",
               },
               {
                  name: "ibm-sterling-cve202139033-info-disc (213963)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213963",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
               ],
            },
         ],
         datePublic: "2022-04-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 213963.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/UI:N/PR:L/S:U/I:N/A:N/C:L/AC:L/AV:N/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-19T16:15:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6573049",
            },
            {
               name: "ibm-sterling-cve202139033-info-disc (213963)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213963",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-04-18T00:00:00",
               ID: "CVE-2021-39033",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 213963.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6573049",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6573049 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6573049",
                  },
                  {
                     name: "ibm-sterling-cve202139033-info-disc (213963)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213963",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-39033",
      datePublished: "2022-04-19T16:15:18.842500Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-16T23:31:47.546Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4595
Vulnerability from cvelistv5
Published
2020-02-24 15:35
Modified
2024-09-16 23:30
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 167878.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:48.312Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/3137439",
               },
               {
                  name: "ibm-sterling-cve20194595-open-redirect (167878)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167878",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
               ],
            },
         ],
         datePublic: "2020-02-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 167878.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.9,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/UI:R/C:N/AV:N/I:H/AC:L/PR:L/A:N/S:C/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-24T15:35:29",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/3137439",
            },
            {
               name: "ibm-sterling-cve20194595-open-redirect (167878)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167878",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-02-20T00:00:00",
               ID: "CVE-2019-4595",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 167878.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "H",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/3137439",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 3137439 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/3137439",
                  },
                  {
                     name: "ibm-sterling-cve20194595-open-redirect (167878)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167878",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4595",
      datePublished: "2020-02-24T15:35:29.653291Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T23:30:57.431Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29903
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 23:00
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.290Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495919",
               },
               {
                  name: "ibm-sterling-cve202129903-sql-injection (207506)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/207506",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:L/PR:L/UI:N/I:L/AV:N/S:U/AC:L/C:L/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:44",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495919",
            },
            {
               name: "ibm-sterling-cve202129903-sql-injection (207506)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/207506",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29903",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495919",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495919 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495919",
                  },
                  {
                     name: "ibm-sterling-cve202129903-sql-injection (207506)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/207506",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29903",
      datePublished: "2021-10-06T17:10:44.242107Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-16T23:00:34.408Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1326
Vulnerability from cvelistv5
Published
2017-06-22 18:00
Modified
2024-08-05 13:32
Severity ?
Summary
IBM Sterling File Gateway does not properly restrict user requests based on permission level. This allows for users to update data related to other users, by manipulating the parameters passed in the POST request. IBM X-Force ID: 126060.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.159Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99183",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99183",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126060",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004274",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling File Gateway does not properly restrict user requests based on permission level. This allows for users to update data related to other users, by manipulating the parameters passed in the POST request. IBM X-Force ID: 126060.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Bypass Security",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-23T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99183",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99183",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126060",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004274",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1326",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling File Gateway does not properly restrict user requests based on permission level. This allows for users to update data related to other users, by manipulating the parameters passed in the POST request. IBM X-Force ID: 126060.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Bypass Security",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99183",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99183",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126060",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126060",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004274",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004274",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1326",
      datePublished: "2017-06-22T18:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:32:29.159Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4738
Vulnerability from cvelistv5
Published
2020-12-10 22:11
Modified
2024-09-17 03:19
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.1 discloses sensitive information to an authenticated user from the dashboard UI which could be used in further attacks against the system. IBM X-Force ID: 172753.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:49.043Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6380390",
               },
               {
                  name: "ibm-sterling-cve20194738-info-disc (172753)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172753",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.1",
                  },
               ],
            },
         ],
         datePublic: "2020-12-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.1 discloses sensitive information to an authenticated user from the dashboard UI which could be used in further attacks against the system. IBM X-Force ID: 172753.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:L/UI:N/S:U/AV:N/I:N/AC:L/A:N/PR:L/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-12-10T22:11:06",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6380390",
            },
            {
               name: "ibm-sterling-cve20194738-info-disc (172753)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172753",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-12-09T00:00:00",
               ID: "CVE-2019-4738",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.1 discloses sensitive information to an authenticated user from the dashboard UI which could be used in further attacks against the system. IBM X-Force ID: 172753.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6380390",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6380390 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6380390",
                  },
                  {
                     name: "ibm-sterling-cve20194738-info-disc (172753)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172753",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4738",
      datePublished: "2020-12-10T22:11:06.307031Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T03:19:07.522Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29798
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-17 01:31
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 203734.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.138Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495925",
               },
               {
                  name: "ibm-sterling-cve202129798-sql-injection (203734)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/203734",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 203734.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/UI:N/AV:N/I:L/S:U/AC:L/C:L/A:L/PR:L/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:37",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495925",
            },
            {
               name: "ibm-sterling-cve202129798-sql-injection (203734)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/203734",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29798",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 203734.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495925",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495925 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495925",
                  },
                  {
                     name: "ibm-sterling-cve202129798-sql-injection (203734)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/203734",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29798",
      datePublished: "2021-10-06T17:10:37.788924Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-17T01:31:26.083Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4564
Vulnerability from cvelistv5
Published
2020-10-20 14:15
Modified
2024-09-16 16:38
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933.
Impacted products
Vendor Product Version
IBM Sterling File Gateway Version: 2.2.0.0
Version: 6.0.3.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.056Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6349539",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6349533",
               },
               {
                  name: "ibm-sterling-cve20204564-xss (183933)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/183933",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.1",
                  },
               ],
            },
            {
               product: "Sterling File Gateway",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "2.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.1",
                  },
               ],
            },
         ],
         datePublic: "2020-10-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/C:L/A:N/AV:N/AC:L/S:C/I:L/PR:L/UI:R/E:H/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-20T14:15:32",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6349539",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6349533",
            },
            {
               name: "ibm-sterling-cve20204564-xss (183933)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/183933",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-10-19T00:00:00",
               ID: "CVE-2020-4564",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Sterling File Gateway",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "2.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.1 and IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183933.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6349539",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6349539 (Sterling File Gateway)",
                     url: "https://www.ibm.com/support/pages/node/6349539",
                  },
                  {
                     name: "https://www.ibm.com/support/pages/node/6349533",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6349533 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6349533",
                  },
                  {
                     name: "ibm-sterling-cve20204564-xss (183933)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/183933",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4564",
      datePublished: "2020-10-20T14:15:32.747465Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T16:38:35.227Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-50307
Vulnerability from cvelistv5
Published
2024-04-12 02:30
Modified
2024-08-02 22:16
Summary
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 273338.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-50307",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-15T14:29:48.315139Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:17:54.465Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T22:16:46.342Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7148015",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/273338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.9",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.3",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.2.0.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  273338.",
                  },
               ],
               value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  273338.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-12T02:30:56.429Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7148015",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/273338",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator cross-site scripting",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2023-50307",
      datePublished: "2024-04-12T02:30:56.429Z",
      dateReserved: "2023-12-07T01:28:46.424Z",
      dateUpdated: "2024-08-02T22:16:46.342Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1349
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:32
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 stores potentially sensitive information from HTTP sessions that could be read by a local user. IBM X-Force ID: 126525.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.703Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126525",
               },
               {
                  name: "99236",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99236",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004209",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 stores potentially sensitive information from HTTP sessions that could be read by a local user. IBM X-Force ID: 126525.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126525",
            },
            {
               name: "99236",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99236",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004209",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1349",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 stores potentially sensitive information from HTTP sessions that could be read by a local user. IBM X-Force ID: 126525.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126525",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126525",
                  },
                  {
                     name: "99236",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99236",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004209",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004209",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1349",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:32:29.703Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29855
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-17 01:05
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205684.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.411Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495965",
               },
               {
                  name: "ibm-sterling-cve202129855-xss (205684)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/205684",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205684.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/PR:L/A:N/AC:L/C:L/I:L/AV:N/UI:R/S:C/RL:O/E:H/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:42",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495965",
            },
            {
               name: "ibm-sterling-cve202129855-xss (205684)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/205684",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29855",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205684.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495965",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495965 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495965",
                  },
                  {
                     name: "ibm-sterling-cve202129855-xss (205684)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/205684",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29855",
      datePublished: "2021-10-06T17:10:42.649103Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-17T01:05:46.716Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22876
Vulnerability from cvelistv5
Published
2023-03-15 18:39
Modified
2024-08-02 10:20
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 244364.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:20:31.251Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6963093",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/244364",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThan: "6.0.3.7",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "6.1.2.1",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against the system.  IBM X-Force ID:  244364.",
                  },
               ],
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against the system.  IBM X-Force ID:  244364.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-03-15T18:39:30.727Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/6963093",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/244364",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator information disclosure",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2023-22876",
      datePublished: "2023-03-15T18:39:30.727Z",
      dateReserved: "2023-01-09T15:16:49.251Z",
      dateUpdated: "2024-08-02T10:20:31.251Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4029
Vulnerability from cvelistv5
Published
2019-03-05 18:00
Modified
2024-09-16 18:33
Summary
IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-force ID: 155907.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.931Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "107223",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107223",
               },
               {
                  name: "ibm-sterling-cve20194029-xss(155907)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155907",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
               ],
            },
         ],
         datePublic: "2019-02-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-force ID: 155907.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-06T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "107223",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107223",
            },
            {
               name: "ibm-sterling-cve20194029-xss(155907)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155907",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-02-28T00:00:00",
               ID: "CVE-2019-4029",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-force ID: 155907.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "107223",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107223",
                  },
                  {
                     name: "ibm-sterling-cve20194029-xss(155907)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155907",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4029",
      datePublished: "2019-03-05T18:00:00Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T18:33:20.281Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4762
Vulnerability from cvelistv5
Published
2021-01-05 15:10
Modified
2024-09-17 03:38
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow an authenticated user to create a privileged account due to improper access controls. IBM X-Force ID: 188896.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:58.341Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6396130",
               },
               {
                  name: "ibm-sterling-cve20204762-priv-escalation (188896)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188896",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_2",
                  },
               ],
            },
         ],
         datePublic: "2021-01-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow an authenticated user to create a privileged account due to improper access controls. IBM X-Force ID: 188896.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 7.7,
                  temporalSeverity: "HIGH",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:H/UI:N/PR:L/C:H/AV:N/I:H/S:U/AC:L/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Privileges",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-05T15:10:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6396130",
            },
            {
               name: "ibm-sterling-cve20204762-priv-escalation (188896)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188896",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-01-04T00:00:00",
               ID: "CVE-2020-4762",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5_2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow an authenticated user to create a privileged account due to improper access controls. IBM X-Force ID: 188896.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "H",
                     AC: "L",
                     AV: "N",
                     C: "H",
                     I: "H",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Privileges",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6396130",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6396130 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6396130",
                  },
                  {
                     name: "ibm-sterling-cve20204762-priv-escalation (188896)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188896",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4762",
      datePublished: "2021-01-05T15:10:18.989105Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T03:38:20.531Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4074
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 22:51
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157108.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.970Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194074-xss (157108)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157108",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157108.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/I:L/C:L/AC:L/AV:N/A:N/S:C/PR:L/UI:R/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194074-xss (157108)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157108",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4074",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157108.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194074-xss (157108)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157108",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4074",
      datePublished: "2019-04-25T14:36:43.502808Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T22:51:18.750Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4761
Vulnerability from cvelistv5
Published
2021-01-05 15:10
Modified
2024-09-17 03:07
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 188895.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:59.009Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6396146",
               },
               {
                  name: "ibm-sterling-cve20204761-info-disc (188895)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188895",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_2",
                  },
               ],
            },
         ],
         datePublic: "2021-01-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 188895.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 4.6,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/S:U/AC:L/A:N/UI:N/PR:N/C:L/I:N/AV:N/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-05T15:10:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6396146",
            },
            {
               name: "ibm-sterling-cve20204761-info-disc (188895)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188895",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-01-04T00:00:00",
               ID: "CVE-2020-4761",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5_2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 188895.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6396146",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6396146 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6396146",
                  },
                  {
                     name: "ibm-sterling-cve20204761-info-disc (188895)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/188895",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4761",
      datePublished: "2021-01-05T15:10:18.312120Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T03:07:14.619Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4076
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 20:58
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157110.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.929Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194076-xss (157110)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157110",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157110.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/C:L/I:L/UI:R/S:C/PR:L/AV:N/A:N/AC:L/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194076-xss (157110)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157110",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4076",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157110.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194076-xss (157110)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157110",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4076",
      datePublished: "2019-04-25T14:36:43.579561Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:58:20.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4073
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 20:21
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157107.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.939Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194073-xss (157107)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157107",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157107.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/I:L/C:L/AC:L/S:C/PR:L/A:N/AV:N/UI:R/RL:O/RC:C/E:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194073-xss (157107)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157107",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4073",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157107.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194073-xss (157107)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157107",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4073",
      datePublished: "2019-04-25T14:36:43.460864Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:21:43.071Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4222
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 16:38
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to view process definition of a business process without permission. IBM X-Force ID: 159231.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:33:37.660Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
               },
               {
                  name: "ibm-sterling-cve20194222-info-disc (159231)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159231",
               },
               {
                  name: "108110",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108110",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to view process definition of a business process without permission. IBM X-Force ID: 159231.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/UI:N/A:N/AV:N/S:U/PR:L/AC:L/C:L/I:N/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-01T12:06:04",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
            },
            {
               name: "ibm-sterling-cve20194222-info-disc (159231)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159231",
            },
            {
               name: "108110",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108110",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4222",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to view process definition of a business process without permission. IBM X-Force ID: 159231.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880595 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
                  },
                  {
                     name: "ibm-sterling-cve20194222-info-disc (159231)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/159231",
                  },
                  {
                     name: "108110",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108110",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4222",
      datePublished: "2019-04-25T14:36:43.789630Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T16:38:20.202Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-20562
Vulnerability from cvelistv5
Published
2021-07-27 11:25
Modified
2024-09-16 16:48
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199232.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T17:45:44.297Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6475301",
               },
               {
                  name: "ibm-sterling-cve202120562-xss (199232)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199232",
               },
               {
                  name: "20211104 SEC Consult SA-20211104-0 :: Reflected cross-site scripting vulnerability in IBM Sterling B2B Integrator",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2021/Nov/16",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_3",
                  },
               ],
            },
         ],
         datePublic: "2021-07-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199232.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AC:L/A:N/I:L/S:C/AV:N/PR:L/C:L/UI:R/RC:C/E:H/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-05T17:06:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6475301",
            },
            {
               name: "ibm-sterling-cve202120562-xss (199232)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199232",
            },
            {
               name: "20211104 SEC Consult SA-20211104-0 :: Reflected cross-site scripting vulnerability in IBM Sterling B2B Integrator",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2021/Nov/16",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-07-26T00:00:00",
               ID: "CVE-2021-20562",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.2",
                                       },
                                       {
                                          version_value: "5.2.6.5_3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199232.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6475301",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6475301 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6475301",
                  },
                  {
                     name: "ibm-sterling-cve202120562-xss (199232)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199232",
                  },
                  {
                     name: "20211104 SEC Consult SA-20211104-0 :: Reflected cross-site scripting vulnerability in IBM Sterling B2B Integrator",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2021/Nov/16",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/164782/IBM-Sterling-B2B-Integrator-Cross-Site-Scripting.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-20562",
      datePublished: "2021-07-27T11:25:17.174877Z",
      dateReserved: "2020-12-17T00:00:00",
      dateUpdated: "2024-09-16T16:48:16.529Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4668
Vulnerability from cvelistv5
Published
2022-04-08 15:30
Modified
2024-09-16 23:45
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186283.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.117Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6570407",
               },
               {
                  name: "ibm-sterling-cve20204668-csrf (186283)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186283",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
               ],
            },
         ],
         datePublic: "2022-04-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186283.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/S:U/UI:R/C:N/AC:L/PR:N/I:L/AV:N/A:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-08T15:30:19",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6570407",
            },
            {
               name: "ibm-sterling-cve20204668-csrf (186283)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186283",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-04-07T00:00:00",
               ID: "CVE-2020-4668",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.3, and 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186283.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "L",
                     PR: "N",
                     S: "U",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6570407",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6570407 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6570407",
                  },
                  {
                     name: "ibm-sterling-cve20204668-csrf (186283)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186283",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4668",
      datePublished: "2022-04-08T15:30:19.914886Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T23:45:41.051Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4598
Vulnerability from cvelistv5
Published
2020-02-26 15:55
Modified
2024-09-17 03:52
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167881.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:48.338Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/3145065",
               },
               {
                  name: "ibm-sterling-cve20194598-sql-injection (167881)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167881",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
               ],
            },
         ],
         datePublic: "2020-02-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167881.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AC:L/S:U/AV:N/C:L/I:L/PR:L/UI:N/A:L/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-26T15:55:24",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/3145065",
            },
            {
               name: "ibm-sterling-cve20194598-sql-injection (167881)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167881",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-02-25T00:00:00",
               ID: "CVE-2019-4598",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167881.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/3145065",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 3145065 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/3145065",
                  },
                  {
                     name: "ibm-sterling-cve20194598-sql-injection (167881)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167881",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4598",
      datePublished: "2020-02-26T15:55:24.265324Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T03:52:40.862Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29700
Vulnerability from cvelistv5
Published
2021-10-07 18:06
Modified
2024-09-17 00:05
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:01.463Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6496749",
               },
               {
                  name: "ibm-sterling-cve202129700-info-disc (200656)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/200656",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.2",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
               ],
            },
         ],
         datePublic: "2021-10-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/I:N/PR:L/AC:L/C:L/S:U/UI:N/A:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-07T18:06:00",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6496749",
            },
            {
               name: "ibm-sterling-cve202129700-info-disc (200656)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/200656",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-06T00:00:00",
               ID: "CVE-2021-29700",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.2",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6496749",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6496749 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6496749",
                  },
                  {
                     name: "ibm-sterling-cve202129700-info-disc (200656)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/200656",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29700",
      datePublished: "2021-10-07T18:06:00.287788Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-17T00:05:44.532Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-39035
Vulnerability from cvelistv5
Published
2022-08-16 18:45
Modified
2024-09-16 18:38
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:58:17.599Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6612499",
               },
               {
                  name: "ibm-sterling-cve202139035-xss (213965)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213965",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.1",
                  },
               ],
            },
         ],
         datePublic: "2022-08-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/C:L/AV:N/S:C/PR:L/I:L/A:N/UI:R/AC:L/E:H/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-08-16T18:45:18",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6612499",
            },
            {
               name: "ibm-sterling-cve202139035-xss (213965)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213965",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-08-15T00:00:00",
               ID: "CVE-2021-39035",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                       {
                                          version_value: "6.1.0.4",
                                       },
                                       {
                                          version_value: "6.1.1.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6612499",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6612499 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6612499",
                  },
                  {
                     name: "ibm-sterling-cve202139035-xss (213965)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/213965",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-39035",
      datePublished: "2022-08-16T18:45:18.777427Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-16T18:38:26.744Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4680
Vulnerability from cvelistv5
Published
2020-10-20 14:15
Modified
2024-09-16 19:19
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 171733.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:49.030Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6349515",
               },
               {
                  name: "ibm-sterling-cve20194680-sql-injection (171733)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/171733",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.2.2",
                  },
               ],
            },
         ],
         datePublic: "2020-10-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 171733.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:L/C:L/PR:L/UI:N/S:U/I:L/AC:L/AV:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-20T14:15:31",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6349515",
            },
            {
               name: "ibm-sterling-cve20194680-sql-injection (171733)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/171733",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-10-19T00:00:00",
               ID: "CVE-2019-4680",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.2.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 171733.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6349515",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6349515 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6349515",
                  },
                  {
                     name: "ibm-sterling-cve20194680-sql-injection (171733)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/171733",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4680",
      datePublished: "2020-10-20T14:15:31.882069Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T19:19:19.364Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4028
Vulnerability from cvelistv5
Published
2019-03-05 18:00
Modified
2024-09-17 02:52
Summary
IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155906.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.746Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "107223",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107223",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
               },
               {
                  name: "ibm-sterling-cve20194028-xss(155906)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155906",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
               ],
            },
         ],
         datePublic: "2019-02-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155906.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-06T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "107223",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107223",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
            },
            {
               name: "ibm-sterling-cve20194028-xss(155906)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155906",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-02-28T00:00:00",
               ID: "CVE-2019-4028",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155906.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "107223",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107223",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                  },
                  {
                     name: "ibm-sterling-cve20194028-xss(155906)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155906",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4028",
      datePublished: "2019-03-05T18:00:00Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T02:52:32.605Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1482
Vulnerability from cvelistv5
Published
2017-12-07 15:00
Modified
2024-09-16 23:46
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128620.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.911Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128620",
               },
               {
                  name: "102035",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102035",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22010762",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
               ],
            },
         ],
         datePublic: "2017-11-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128620.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-12-08T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128620",
            },
            {
               name: "102035",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102035",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22010762",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2017-11-29T00:00:00",
               ID: "CVE-2017-1482",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128620.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128620",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128620",
                  },
                  {
                     name: "102035",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102035",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22010762",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22010762",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1482",
      datePublished: "2017-12-07T15:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-16T23:46:25.680Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1718
Vulnerability from cvelistv5
Published
2018-07-31 13:00
Modified
2024-09-16 17:57
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.1 - 5.2.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 147166.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:07:44.329Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ibm-sterling-cve20181718-xss(147166)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147166",
               },
               {
                  name: "104938",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104938",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10718863",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.3",
                  },
               ],
            },
         ],
         datePublic: "2018-07-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.1 - 5.2.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 147166.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-02T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "ibm-sterling-cve20181718-xss(147166)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147166",
            },
            {
               name: "104938",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104938",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10718863",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-07-26T00:00:00",
               ID: "CVE-2018-1718",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "5.2.6.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.1 - 5.2.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 147166.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ibm-sterling-cve20181718-xss(147166)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/147166",
                  },
                  {
                     name: "104938",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104938",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10718863",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10718863",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1718",
      datePublished: "2018-07-31T13:00:00Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T17:57:56.491Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29837
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-17 02:36
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.076Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495907",
               },
               {
                  name: "ibm-sterling-cve202129837-csrf (204913)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204913",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/UI:R/I:L/AV:N/S:U/AC:L/C:N/A:N/PR:N/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:41",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495907",
            },
            {
               name: "ibm-sterling-cve202129837-csrf (204913)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204913",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29837",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "L",
                     PR: "N",
                     S: "U",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495907",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495907 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495907",
                  },
                  {
                     name: "ibm-sterling-cve202129837-csrf (204913)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204913",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29837",
      datePublished: "2021-10-06T17:10:41.108863Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-17T02:36:11.572Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29836
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 19:04
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:03.132Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495921",
               },
               {
                  name: "ibm-sterling-cve202129836-xss (204912)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204912",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
                  {
                     status: "affected",
                     version: "2.2.0.0",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/PR:L/A:N/C:L/AC:L/S:C/UI:R/AV:N/I:L/RL:O/E:H/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:39",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495921",
            },
            {
               name: "ibm-sterling-cve202129836-xss (204912)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204912",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29836",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                       {
                                          version_value: "2.2.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495921",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495921 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495921",
                  },
                  {
                     name: "ibm-sterling-cve202129836-xss (204912)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/204912",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29836",
      datePublished: "2021-10-06T17:10:39.325281Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-16T19:04:52.712Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4566
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-17 03:39
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 stores potentially highly sensitive information in log files that could be read by an authenticated user. IBM X-Force ID: 184083.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:48.925Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6367975",
               },
               {
                  name: "ibm-sterling-cve20204566-info-disc (184083)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/184083",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.6.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 stores potentially highly sensitive information in log files that could be read by an authenticated user. IBM X-Force ID: 184083.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/UI:N/AC:L/S:U/I:N/A:N/PR:L/C:H/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:33",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6367975",
            },
            {
               name: "ibm-sterling-cve20204566-info-disc (184083)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/184083",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4566",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.6.0",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 stores potentially highly sensitive information in log files that could be read by an authenticated user. IBM X-Force ID: 184083.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6367975",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6367975 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6367975",
                  },
                  {
                     name: "ibm-sterling-cve20204566-info-disc (184083)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/184083",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4566",
      datePublished: "2020-11-16T16:40:33.967550Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T03:39:01.788Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4043
Vulnerability from cvelistv5
Published
2019-04-02 13:20
Modified
2024-09-16 16:32
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0 snf 6.0.0.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 156239.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.978Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10874238",
               },
               {
                  name: "ibm-sterling-cve20194043-xxe (156239)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/156239",
               },
               {
                  name: "107778",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107778",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
               ],
            },
         ],
         datePublic: "2019-03-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0 snf 6.0.0.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 156239.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 6.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/PR:L/AC:L/S:U/C:H/UI:N/I:N/A:L/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-05T10:06:05",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10874238",
            },
            {
               name: "ibm-sterling-cve20194043-xxe (156239)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/156239",
            },
            {
               name: "107778",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107778",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-03-29T00:00:00",
               ID: "CVE-2019-4043",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0 snf 6.0.0.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 156239.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10874238",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 874238 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10874238",
                  },
                  {
                     name: "ibm-sterling-cve20194043-xxe (156239)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/156239",
                  },
                  {
                     name: "107778",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107778",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4043",
      datePublished: "2019-04-02T13:20:33.975241Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T16:32:40.540Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4475
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-17 04:29
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:48.895Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6367963",
               },
               {
                  name: "ibm-sterling-cve20204475-info-disc (181777)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/181777",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:L/PR:L/A:N/I:N/S:U/UI:N/AC:L/AV:N/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:32",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6367963",
            },
            {
               name: "ibm-sterling-cve20204475-info-disc (181777)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/181777",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4475",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6367963",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6367963 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6367963",
                  },
                  {
                     name: "ibm-sterling-cve20204475-info-disc (181777)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/181777",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4475",
      datePublished: "2020-11-16T16:40:33.069244Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T04:29:24.756Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-20553
Vulnerability from cvelistv5
Published
2024-12-18 23:39
Modified
2024-12-19 16:39
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-20553",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-19T16:26:24.476306Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-19T16:39:07.625Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.6.5:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.6:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.3.4:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*",
                  "cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.0.2:*:*:*:standard:*:*:*",
               ],
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "5.2.6.5",
                     status: "affected",
                     version: "5.2.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.0.0.6",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.0.3.4",
                     status: "affected",
                     version: "6.0.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.0.2",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(255, 255, 255);\">IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. </span>",
                  },
               ],
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-18T23:39:03.856Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               url: "https://www.ibm.com/support/pages/node/6496761",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator Standard Edition cross-site scripting",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-20553",
      datePublished: "2024-12-18T23:39:03.856Z",
      dateReserved: "2020-12-17T19:17:34.773Z",
      dateUpdated: "2024-12-19T16:39:07.625Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-42016
Vulnerability from cvelistv5
Published
2024-02-09 01:01
Modified
2024-08-22 15:55
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 265559.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T19:16:50.543Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7116083",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/265559",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-42016",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-22T15:53:52.739086Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-22T15:55:17.947Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.8",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.3",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.  IBM X-Force ID:  265559.",
                  },
               ],
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.  IBM X-Force ID:  265559.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-614",
                     description: "CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-09T01:01:03.137Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7116083",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/265559",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator information disclosure",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2023-42016",
      datePublished: "2024-02-09T01:01:03.137Z",
      dateReserved: "2023-09-06T19:33:10.323Z",
      dateUpdated: "2024-08-22T15:55:17.947Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4027
Vulnerability from cvelistv5
Published
2019-03-05 18:00
Modified
2024-09-16 20:31
Summary
IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-ForceID: 155905.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.769Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "107223",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107223",
               },
               {
                  name: "ibm-sterling-cve20194027-xss(155905)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155905",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
               ],
            },
         ],
         datePublic: "2019-02-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-ForceID: 155905.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-06T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "107223",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107223",
            },
            {
               name: "ibm-sterling-cve20194027-xss(155905)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155905",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-02-28T00:00:00",
               ID: "CVE-2019-4027",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-ForceID: 155905.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "107223",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107223",
                  },
                  {
                     name: "ibm-sterling-cve20194027-xss(155905)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/155905",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10874246",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4027",
      datePublished: "2019-03-05T18:00:00Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:31:25.043Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4063
Vulnerability from cvelistv5
Published
2019-03-05 18:00
Modified
2024-09-17 04:18
Summary
IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 Standard Edition could allow highly sensitive information to be transmitted in plain text. An attacker could obtain this information using man in the middle techniques. IBM X-ForceID: 157008.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:27.905Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ibm-sterling-cve20194063-info-disc(157008)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157008",
               },
               {
                  name: "107310",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107310",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10874234",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.1",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
               ],
            },
         ],
         datePublic: "2019-02-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 Standard Edition could allow highly sensitive information to be transmitted in plain text. An attacker could obtain this information using man in the middle techniques. IBM X-ForceID: 157008.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/AC:H/AV:N/C:H/I:N/PR:N/S:U/UI:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-08T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "ibm-sterling-cve20194063-info-disc(157008)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157008",
            },
            {
               name: "107310",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107310",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10874234",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-02-28T00:00:00",
               ID: "CVE-2019-4063",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.1",
                                       },
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.1 through 6.0.0.0 Standard Edition could allow highly sensitive information to be transmitted in plain text. An attacker could obtain this information using man in the middle techniques. IBM X-ForceID: 157008.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ibm-sterling-cve20194063-info-disc(157008)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157008",
                  },
                  {
                     name: "107310",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107310",
                  },
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10874234",
                     refsource: "CONFIRM",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10874234",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4063",
      datePublished: "2019-03-05T18:00:00Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T04:18:59.985Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4726
Vulnerability from cvelistv5
Published
2020-02-26 15:55
Modified
2024-09-16 20:26
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172363.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:49.197Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/3145833",
               },
               {
                  name: "ibm-sterling-cve20194726-csrf (172363)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172363",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
               ],
            },
         ],
         datePublic: "2020-02-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172363.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AC:L/S:U/AV:N/I:L/PR:N/C:N/A:N/UI:R/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-26T15:55:24",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/3145833",
            },
            {
               name: "ibm-sterling-cve20194726-csrf (172363)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172363",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-02-25T00:00:00",
               ID: "CVE-2019-4726",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172363.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "N",
                     I: "L",
                     PR: "N",
                     S: "U",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/3145833",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 3145833 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/3145833",
                  },
                  {
                     name: "ibm-sterling-cve20194726-csrf (172363)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172363",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4726",
      datePublished: "2020-02-26T15:55:24.691939Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:26:43.136Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4937
Vulnerability from cvelistv5
Published
2020-11-20 13:50
Modified
2024-09-17 04:08
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 191814.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:59.130Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6370795",
               },
               {
                  name: "ibm-sterling-cve20204937-info-disc (191814)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/191814",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 191814.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:H/I:N/S:U/UI:N/PR:N/A:N/AC:H/AV:N/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-20T13:50:14",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6370795",
            },
            {
               name: "ibm-sterling-cve20204937-info-disc (191814)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/191814",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-19T00:00:00",
               ID: "CVE-2020-4937",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 191814.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6370795",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6370795 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6370795",
                  },
                  {
                     name: "ibm-sterling-cve20204937-info-disc (191814)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/191814",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4937",
      datePublished: "2020-11-20T13:50:15.078128Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T04:08:44.771Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-22357
Vulnerability from cvelistv5
Published
2024-04-12 02:28
Modified
2024-08-09 15:18
Summary
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280894.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:43:34.557Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7148010",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/280894",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "sterling_b2b_integrator",
                  vendor: "ibm",
                  versions: [
                     {
                        lessThanOrEqual: "6.0.3.9",
                        status: "affected",
                        version: "6.0.0.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "6.1.2.3",
                        status: "affected",
                        version: "6.1.0.0",
                        versionType: "semver",
                     },
                     {
                        status: "affected",
                        version: "6.2.0.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-22357",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-09T15:13:26.158227Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-09T15:18:06.282Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.9",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.3",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.2.0.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  280894.",
                  },
               ],
               value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  280894.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-12T02:28:22.476Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7148010",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/280894",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator cross-site scripting",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2024-22357",
      datePublished: "2024-04-12T02:28:22.476Z",
      dateReserved: "2024-01-08T23:42:36.758Z",
      dateUpdated: "2024-08-09T15:18:06.282Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1347
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:32
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 126462.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.556Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99231",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99231",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126462",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 126462.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99231",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99231",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126462",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1347",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 126462.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99231",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99231",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126462",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/126462",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1347",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:32:29.556Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4671
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-16 22:56
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 stores potentially sensitive information in log files that could be read by an authenticatedl user. IBM X-Force ID: 186284.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.117Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6368001",
               },
               {
                  name: "ibm-sterling-cve20204671-info-disc (186284)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186284",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 stores potentially sensitive information in log files that could be read by an authenticatedl user. IBM X-Force ID: 186284.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/S:U/UI:N/AC:L/A:N/PR:L/I:N/C:H/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:35",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6368001",
            },
            {
               name: "ibm-sterling-cve20204671-info-disc (186284)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186284",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4671",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 stores potentially sensitive information in log files that could be read by an authenticatedl user. IBM X-Force ID: 186284.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "H",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6368001",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6368001 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6368001",
                  },
                  {
                     name: "ibm-sterling-cve20204671-info-disc (186284)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186284",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4671",
      datePublished: "2020-11-16T16:40:35.851179Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T22:56:11.926Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29764
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-16 16:24
Summary
IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:02.931Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495967",
               },
               {
                  name: "ibm-sterling-cve202129764-xss (202268)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 6.1,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/PR:L/S:C/I:L/AV:N/UI:N/C:L/AC:L/RL:O/E:H/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-25T13:05:09",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495967",
            },
            {
               name: "ibm-sterling-cve202129764-xss (202268)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29764",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "N",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495967",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495967 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495967",
                  },
                  {
                     name: "ibm-sterling-cve202129764-xss (202268)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202268",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29764",
      datePublished: "2021-10-06T17:10:36.253596Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-16T16:24:05.784Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4077
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 20:06
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157111.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:28.002Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194077-xss (157111)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157111",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157111.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/UI:R/AC:L/S:C/PR:L/AV:N/A:N/C:L/I:L/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194077-xss (157111)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157111",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4077",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157111.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194077-xss (157111)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/157111",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4077",
      datePublished: "2019-04-25T14:36:43.622785Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:06:16.632Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1679
Vulnerability from cvelistv5
Published
2018-07-20 16:00
Modified
2024-09-16 16:22
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow an unauthenticated user to obtain sensitive information that could be used in further attacks against the system. IBM X-Force ID: 145180.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:07:44.326Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ibm-sterling-cve20181679-info-disc(145180)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/145180",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
               },
               {
                  name: "104927",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104927",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2018-07-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow an unauthenticated user to obtain sensitive information that could be used in further attacks against the system. IBM X-Force ID: 145180.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 4.6,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:N/PR:N/S:U/UI:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-01T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "ibm-sterling-cve20181679-info-disc(145180)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/145180",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
            },
            {
               name: "104927",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104927",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-07-17T00:00:00",
               ID: "CVE-2018-1679",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow an unauthenticated user to obtain sensitive information that could be used in further attacks against the system. IBM X-Force ID: 145180.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "N",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ibm-sterling-cve20181679-info-disc(145180)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/145180",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                  },
                  {
                     name: "104927",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104927",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1679",
      datePublished: "2018-07-20T16:00:00Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T16:22:58.882Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-9983
Vulnerability from cvelistv5
Published
2017-06-22 18:00
Modified
2024-08-06 03:07
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user with special privileges to view files that they should not have access to. IBM X-Force ID: 120275.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T03:07:31.401Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99198",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99198",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120275",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user with special privileges to view files that they should not have access to. IBM X-Force ID: 120275.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-23T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99198",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99198",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120275",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2016-9983",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow an authenticated user with special privileges to view files that they should not have access to. IBM X-Force ID: 120275.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99198",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99198",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120275",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/120275",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004273",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2016-9983",
      datePublished: "2017-06-22T18:00:00",
      dateReserved: "2016-12-16T00:00:00",
      dateUpdated: "2024-08-06T03:07:31.401Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4700
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-16 18:29
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user belonging to a specific user group to create a user or group with administrative privileges. IBM X-Force ID: 187077.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:57.487Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6367979",
               },
               {
                  name: "ibm-sterling-cve20204700-priv-escalation (187077)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187077",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user belonging to a specific user group to create a user or group with administrative privileges. IBM X-Force ID: 187077.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 6.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/I:H/PR:L/A:H/C:H/AV:N/AC:H/UI:N/S:U/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Privileges",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:37",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6367979",
            },
            {
               name: "ibm-sterling-cve20204700-priv-escalation (187077)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187077",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4700",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user belonging to a specific user group to create a user or group with administrative privileges. IBM X-Force ID: 187077.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "H",
                     AC: "H",
                     AV: "N",
                     C: "H",
                     I: "H",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Privileges",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6367979",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6367979 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6367979",
                  },
                  {
                     name: "ibm-sterling-cve20204700-priv-escalation (187077)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187077",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4700",
      datePublished: "2020-11-16T16:40:37.240025Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T18:29:13.906Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4596
Vulnerability from cvelistv5
Published
2020-02-26 15:55
Modified
2024-09-17 03:02
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 167879.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:48.279Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/3144369",
               },
               {
                  name: "ibm-sterling-cve20194596-xss (167879)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167879",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
               ],
            },
         ],
         datePublic: "2020-02-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 167879.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/UI:R/A:N/C:L/PR:L/I:L/AV:N/S:C/AC:L/E:H/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-26T15:55:23",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/3144369",
            },
            {
               name: "ibm-sterling-cve20194596-xss (167879)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167879",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-02-25T00:00:00",
               ID: "CVE-2019-4596",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 167879.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/3144369",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 3144369 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/3144369",
                  },
                  {
                     name: "ibm-sterling-cve20194596-xss (167879)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/167879",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4596",
      datePublished: "2020-02-26T15:55:23.426984Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T03:02:15.664Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-5893
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-06 01:15
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 115336.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:15:10.781Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004272",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/115336",
               },
               {
                  name: "99228",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99228",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 115336.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004272",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/115336",
            },
            {
               name: "99228",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99228",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2016-5893",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 115336.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004272",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004272",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/115336",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/115336",
                  },
                  {
                     name: "99228",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99228",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2016-5893",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-06-29T00:00:00",
      dateUpdated: "2024-08-06T01:15:10.781Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1193
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:25
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 could allow user to obtain sensitive information using an HTTP GET request. IBM X-Force ID: 123667.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:25:17.426Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667",
               },
               {
                  name: "99229",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99229",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow user to obtain sensitive information using an HTTP GET request. IBM X-Force ID: 123667.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667",
            },
            {
               name: "99229",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99229",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1193",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow user to obtain sensitive information using an HTTP GET request. IBM X-Force ID: 123667.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123667",
                  },
                  {
                     name: "99229",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99229",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1193",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:25:17.426Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4377
Vulnerability from cvelistv5
Published
2019-06-25 15:45
Modified
2024-09-17 00:20
Summary
IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 reveals sensitive information from a stack trace that could be used in further attacks against the system. IBM X-Force ID: 162803.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:33:38.294Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10887853",
               },
               {
                  name: "ibm-sterling-cve20194377-info-disc (162083)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162083",
               },
               {
                  name: "108915",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108915",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-06-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 reveals sensitive information from a stack trace that could be used in further attacks against the system. IBM X-Force ID: 162803.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/I:N/AV:N/C:L/S:U/A:N/PR:L/UI:N/AC:L/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-06-28T08:06:02",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10887853",
            },
            {
               name: "ibm-sterling-cve20194377-info-disc (162083)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162083",
            },
            {
               name: "108915",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108915",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-06-17T00:00:00",
               ID: "CVE-2019-4377",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 reveals sensitive information from a stack trace that could be used in further attacks against the system. IBM X-Force ID: 162803.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10887853",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 887853 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10887853",
                  },
                  {
                     name: "ibm-sterling-cve20194377-info-disc (162083)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/162083",
                  },
                  {
                     name: "108915",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108915",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4377",
      datePublished: "2019-06-25T15:45:30.240286Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T00:20:50.196Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-20571
Vulnerability from cvelistv5
Published
2021-10-07 18:05
Modified
2024-09-16 22:24
Summary
IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199246.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T17:45:44.363Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6496753",
               },
               {
                  name: "ibm-sterling-cve202120571-xss (199246)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199246",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
               ],
            },
         ],
         datePublic: "2021-10-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199246.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/UI:N/A:N/C:L/S:C/I:L/PR:L/AC:H/AV:N/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-07T18:05:56",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6496753",
            },
            {
               name: "ibm-sterling-cve202120571-xss (199246)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199246",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-06T00:00:00",
               ID: "CVE-2021-20571",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199246.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "N",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6496753",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6496753 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6496753",
                  },
                  {
                     name: "ibm-sterling-cve202120571-xss (199246)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/199246",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-20571",
      datePublished: "2021-10-07T18:05:57.067380Z",
      dateReserved: "2020-12-17T00:00:00",
      dateUpdated: "2024-09-16T22:24:40.991Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4148
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 19:40
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158414.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:28.015Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
               },
               {
                  name: "ibm-sterling-cve20194148-xss (158414)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158414",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158414.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AC:H/AV:N/A:N/PR:H/S:C/UI:R/I:L/C:L/E:H/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-25T14:36:43",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
            },
            {
               name: "ibm-sterling-cve20194148-xss (158414)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158414",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4148",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158414.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "H",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880591 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880591",
                  },
                  {
                     name: "ibm-sterling-cve20194148-xss (158414)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158414",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4148",
      datePublished: "2019-04-25T14:36:43.750887Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T19:40:18.193Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-39087
Vulnerability from cvelistv5
Published
2022-08-16 18:46
Modified
2024-09-17 03:17
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow an authenticated user to obtain sensitive information due to improper permission controls. IBM X-Force ID: 216109.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:58:17.629Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6612541",
               },
               {
                  name: "ibm-sterling-cve202139087-info-disc (216109)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/216109",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.5",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.1.1",
                  },
               ],
            },
         ],
         datePublic: "2022-08-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow an authenticated user to obtain sensitive information due to improper permission controls. IBM X-Force ID: 216109.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AC:L/UI:N/A:N/I:N/PR:L/S:U/C:L/AV:N/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-08-16T18:46:04",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6612541",
            },
            {
               name: "ibm-sterling-cve202139087-info-disc (216109)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/216109",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2022-08-15T00:00:00",
               ID: "CVE-2021-39087",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.1.1.0",
                                       },
                                       {
                                          version_value: "6.0.3.5",
                                       },
                                       {
                                          version_value: "6.1.0.4",
                                       },
                                       {
                                          version_value: "6.1.1.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow an authenticated user to obtain sensitive information due to improper permission controls. IBM X-Force ID: 216109.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6612541",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6612541 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6612541",
                  },
                  {
                     name: "ibm-sterling-cve202139087-info-disc (216109)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/216109",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-39087",
      datePublished: "2022-08-16T18:46:04.273996Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-09-17T03:17:43.317Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1481
Vulnerability from cvelistv5
Published
2017-12-07 15:00
Modified
2024-09-16 20:42
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 allows a user to view sensitive information that belongs to another user. IBM X-Force ID: 128619.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:30.252Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "102043",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102043",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22010761",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128619",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
               ],
            },
         ],
         datePublic: "2017-12-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 allows a user to view sensitive information that belongs to another user. IBM X-Force ID: 128619.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-12-08T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "102043",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102043",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22010761",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128619",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2017-12-04T00:00:00",
               ID: "CVE-2017-1481",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 allows a user to view sensitive information that belongs to another user. IBM X-Force ID: 128619.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "102043",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102043",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22010761",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22010761",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128619",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/128619",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1481",
      datePublished: "2017-12-07T15:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-16T20:42:49.961Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1302
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:32
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 could allow a local user view sensitive information due to improper access controls. IBM X-Force ID: 125456.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:32:29.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99238",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99238",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/125456",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow a local user view sensitive information due to improper access controls. IBM X-Force ID: 125456.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99238",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99238",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/125456",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1302",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 could allow a local user view sensitive information due to improper access controls. IBM X-Force ID: 125456.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99238",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99238",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/125456",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/125456",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004202",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1302",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:32:29.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4692
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-16 18:49
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user to obtain sensitive information from the Dashboard UI. IBM X-Force ID: 186780.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:57.349Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6368009",
               },
               {
                  name: "ibm-sterling-cve20204692-info-disc (186780)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186780",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user to obtain sensitive information from the Dashboard UI. IBM X-Force ID: 186780.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/C:L/I:N/A:N/PR:L/UI:N/AC:L/S:U/AV:N/E:U/RL:O/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:36",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6368009",
            },
            {
               name: "ibm-sterling-cve20204692-info-disc (186780)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186780",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4692",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user to obtain sensitive information from the Dashboard UI. IBM X-Force ID: 186780.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6368009",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6368009 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6368009",
                  },
                  {
                     name: "ibm-sterling-cve20204692-info-disc (186780)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186780",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4692",
      datePublished: "2020-11-16T16:40:36.811375Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T18:49:38.735Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-29760
Vulnerability from cvelistv5
Published
2021-10-06 17:10
Modified
2024-09-17 02:01
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to download unauthorized files through the dashboard user interface. IBM X-Force ID: 202213.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:18:02.045Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6495969",
               },
               {
                  name: "ibm-sterling-cve202129760-file-download (202213)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202213",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.1.0",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.4",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_4",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.6",
                  },
               ],
            },
         ],
         datePublic: "2021-10-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to download unauthorized files through the dashboard user interface. IBM X-Force ID: 202213.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 4.7,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/PR:L/UI:N/I:L/AV:N/S:U/AC:L/C:L/RL:O/E:U/RC:C",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-06T17:10:32",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6495969",
            },
            {
               name: "ibm-sterling-cve202129760-file-download (202213)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202213",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-10-05T00:00:00",
               ID: "CVE-2021-29760",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.1.0",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.4",
                                       },
                                       {
                                          version_value: "6.1.0.3",
                                       },
                                       {
                                          version_value: "5.2.6.5_4",
                                       },
                                       {
                                          version_value: "6.0.0.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to download unauthorized files through the dashboard user interface. IBM X-Force ID: 202213.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6495969",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6495969 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6495969",
                  },
                  {
                     name: "ibm-sterling-cve202129760-file-download (202213)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/202213",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2021-29760",
      datePublished: "2021-10-06T17:10:33.052242Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-09-17T02:01:43.734Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1564
Vulnerability from cvelistv5
Published
2018-07-20 16:00
Modified
2024-09-16 22:56
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow a local user with administrator privileges to obtain user passwords found in debugging messages. IBM X-Force ID: 142968.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:07:43.851Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
               },
               {
                  name: "104927",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104927",
               },
               {
                  name: "ibm-sterling-cve20181564-info-disc(142968)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/142968",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2018-07-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow a local user with administrator privileges to obtain user passwords found in debugging messages. IBM X-Force ID: 142968.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.9,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:L/C:H/I:N/PR:H/S:U/UI:N/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-01T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
            },
            {
               name: "104927",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104927",
            },
            {
               name: "ibm-sterling-cve20181564-info-disc(142968)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/142968",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-07-17T00:00:00",
               ID: "CVE-2018-1564",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow a local user with administrator privileges to obtain user passwords found in debugging messages. IBM X-Force ID: 142968.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "L",
                     C: "H",
                     I: "N",
                     PR: "H",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=ibm10716747",
                  },
                  {
                     name: "104927",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104927",
                  },
                  {
                     name: "ibm-sterling-cve20181564-info-disc(142968)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/142968",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1564",
      datePublished: "2018-07-20T16:00:00Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T22:56:14.637Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4646
Vulnerability from cvelistv5
Published
2021-05-19 19:40
Modified
2024-09-17 02:05
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, 6.0.0.0 through 6.0.3.3, and 6.1.0.0 through 6.1.0.2 could allow an authenticated user to view pages they shoiuld not have access to due to improper authorization control.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.069Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6454169",
               },
               {
                  name: "ibm-sterling-cve20204646-info-disc (185808)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/185808",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.3",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.2",
                  },
               ],
            },
         ],
         datePublic: "2021-05-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, 6.0.0.0 through 6.0.3.3, and 6.1.0.0 through 6.1.0.2 could allow an authenticated user to view pages they shoiuld not have access to due to improper authorization control.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 3.8,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/I:N/AV:N/UI:N/S:U/C:L/PR:L/AC:L/A:N/RC:C/E:U/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-19T19:40:19",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6454169",
            },
            {
               name: "ibm-sterling-cve20204646-info-disc (185808)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/185808",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-05-18T00:00:00",
               ID: "CVE-2020-4646",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.3",
                                       },
                                       {
                                          version_value: "6.1.0.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, 6.0.0.0 through 6.0.3.3, and 6.1.0.0 through 6.1.0.2 could allow an authenticated user to view pages they shoiuld not have access to due to improper authorization control.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6454169",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6454169 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6454169",
                  },
                  {
                     name: "ibm-sterling-cve20204646-info-disc (185808)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/185808",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4646",
      datePublished: "2021-05-19T19:40:19.748453Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T02:05:34.635Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4146
Vulnerability from cvelistv5
Published
2019-04-25 14:36
Modified
2024-09-16 20:12
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to obtain sensitive document information under unusual circumstances. IBM X-Force ID: 158401.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:26:28.015Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
               },
               {
                  name: "ibm-sterling-cve20194146-info-disc (158401)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158401",
               },
               {
                  name: "108110",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108110",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.0.1",
                  },
               ],
            },
         ],
         datePublic: "2019-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to obtain sensitive document information under unusual circumstances. IBM X-Force ID: 158401.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 2.7,
                  temporalSeverity: "LOW",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/A:N/S:U/PR:L/AC:H/UI:N/I:N/C:L/E:U/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-01T12:06:04",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
            },
            {
               name: "ibm-sterling-cve20194146-info-disc (158401)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158401",
            },
            {
               name: "108110",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108110",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2019-04-20T00:00:00",
               ID: "CVE-2019-4146",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "6.0.0.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 could allow an authenticated user to obtain sensitive document information under unusual circumstances. IBM X-Force ID: 158401.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "H",
                     AV: "N",
                     C: "L",
                     I: "N",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 880595 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/docview.wss?uid=ibm10880595",
                  },
                  {
                     name: "ibm-sterling-cve20194146-info-disc (158401)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/158401",
                  },
                  {
                     name: "108110",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108110",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4146",
      datePublished: "2019-04-25T14:36:43.708761Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-16T20:12:37.015Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-45186
Vulnerability from cvelistv5
Published
2024-04-12 02:45
Modified
2024-08-02 20:14
Summary
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 268691.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-45186",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-17T15:27:45.465134Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:20:01.580Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:14:19.832Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/7148015",
               },
               {
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/268691",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     lessThanOrEqual: "6.0.3.9",
                     status: "affected",
                     version: "6.0.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2.3",
                     status: "affected",
                     version: "6.1.0.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.2.0.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  268691.",
                  },
               ],
               value: "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  268691.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-12T02:45:59.542Z",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.ibm.com/support/pages/node/7148015",
            },
            {
               tags: [
                  "vdb-entry",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/268691",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "IBM Sterling B2B Integrator cross-site scripting",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2023-45186",
      datePublished: "2024-04-12T02:45:59.542Z",
      dateReserved: "2023-10-05T01:39:10.397Z",
      dateUpdated: "2024-08-02T20:14:19.832Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1132
Vulnerability from cvelistv5
Published
2017-06-23 16:00
Modified
2024-08-05 13:25
Severity ?
Summary
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121418.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:25:17.137Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "99233",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/99233",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121418",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121418.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-26T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "99233",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/99233",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121418",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2017-1132",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121418.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "99233",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/99233",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121418",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/121418",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004199",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1132",
      datePublished: "2017-06-23T16:00:00",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-08-05T13:25:17.137Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-1192
Vulnerability from cvelistv5
Published
2017-08-10 15:00
Modified
2024-09-17 00:51
Severity ?
Summary
IBM Sterling B2B Integrator 5.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 123663.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T13:25:17.420Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg22004267",
               },
               {
                  name: "102864",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102864",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123663",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.4",
                  },
                  {
                     status: "affected",
                     version: "5.2.1",
                  },
                  {
                     status: "affected",
                     version: "5.2.2",
                  },
                  {
                     status: "affected",
                     version: "5.2.3",
                  },
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         datePublic: "2017-06-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator 5.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 123663.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Obtain Information",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-01T10:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg22004267",
            },
            {
               name: "102864",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102864",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123663",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2017-06-21T00:00:00",
               ID: "CVE-2017-1192",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2",
                                       },
                                       {
                                          version_value: "5.2.4",
                                       },
                                       {
                                          version_value: "5.2.1",
                                       },
                                       {
                                          version_value: "5.2.2",
                                       },
                                       {
                                          version_value: "5.2.3",
                                       },
                                       {
                                          version_value: "5.2.5",
                                       },
                                       {
                                          version_value: "5.2.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator 5.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 123663.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Obtain Information",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg22004267",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg22004267",
                  },
                  {
                     name: "102864",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102864",
                  },
                  {
                     name: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123663",
                     refsource: "MISC",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/123663",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2017-1192",
      datePublished: "2017-08-10T15:00:00Z",
      dateReserved: "2016-11-30T00:00:00",
      dateUpdated: "2024-09-17T00:51:14.783Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4705
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-16 17:08
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187190.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:14:58.014Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6368013",
               },
               {
                  name: "ibm-sterling-cve20204705-xss (187190)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187190",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187190.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 4.6,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/UI:R/S:C/I:L/A:N/PR:H/C:L/RC:C/E:H/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:37",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6368013",
            },
            {
               name: "ibm-sterling-cve20204705-xss (187190)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187190",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4705",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187190.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "H",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6368013",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6368013 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6368013",
                  },
                  {
                     name: "ibm-sterling-cve20204705-xss (187190)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/187190",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4705",
      datePublished: "2020-11-16T16:40:37.669188Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T17:08:24.700Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-1513
Vulnerability from cvelistv5
Published
2018-07-23 13:00
Modified
2024-09-16 20:31
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0 through 5.2.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141551.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T03:59:39.056Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "ibm-sterling-cve20181513-xss(141551)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/141551",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
               },
               {
                  name: "104910",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/104910",
               },
               {
                  name: "45190",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/45190/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
                  {
                     status: "affected",
                     version: "5.2.0",
                  },
               ],
            },
         ],
         datePublic: "2018-07-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0 through 5.2.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141551.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "CHANGED",
                  temporalScore: 5.2,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:L/PR:L/S:C/UI:R/E:H/RC:C/RL:O",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross-Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-15T09:57:01",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "ibm-sterling-cve20181513-xss(141551)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/141551",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
            },
            {
               name: "104910",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/104910",
            },
            {
               name: "45190",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/45190/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2018-07-18T00:00:00",
               ID: "CVE-2018-1513",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.6",
                                       },
                                       {
                                          version_value: "5.2.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0 through 5.2.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141551.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "N",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "C",
                     UI: "R",
                  },
                  TM: {
                     E: "H",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross-Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "ibm-sterling-cve20181513-xss(141551)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/141551",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=ibm10717031",
                  },
                  {
                     name: "104910",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/104910",
                  },
                  {
                     name: "45190",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/45190/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2018-1513",
      datePublished: "2018-07-23T13:00:00Z",
      dateReserved: "2017-12-13T00:00:00",
      dateUpdated: "2024-09-16T20:31:53.860Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-4728
Vulnerability from cvelistv5
Published
2021-01-05 15:10
Modified
2024-09-17 03:07
Summary
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:40:49.087Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6396172",
               },
               {
                  name: "ibm-sterling-cve20194728-code-exec (172452)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172452",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
                  {
                     status: "affected",
                     version: "6.1.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5_2",
                  },
               ],
            },
         ],
         datePublic: "2021-01-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 7.7,
                  temporalSeverity: "HIGH",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AC:L/S:U/I:H/AV:N/PR:L/C:H/UI:N/A:H/RL:O/RC:C/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Gain Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-05T15:10:17",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6396172",
            },
            {
               name: "ibm-sterling-cve20194728-code-exec (172452)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172452",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2021-01-04T00:00:00",
               ID: "CVE-2019-4728",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                       {
                                          version_value: "6.1.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5_2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "H",
                     AC: "L",
                     AV: "N",
                     C: "H",
                     I: "H",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Gain Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6396172",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6396172 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6396172",
                  },
                  {
                     name: "ibm-sterling-cve20194728-code-exec (172452)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/172452",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2019-4728",
      datePublished: "2021-01-05T15:10:17.666364Z",
      dateReserved: "2019-01-03T00:00:00",
      dateUpdated: "2024-09-17T03:07:40.149Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4655
Vulnerability from cvelistv5
Published
2020-11-16 16:40
Modified
2024-09-16 20:02
Summary
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 186091.
Impacted products
Vendor Product Version
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:07:49.125Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.ibm.com/support/pages/node/6367995",
               },
               {
                  name: "ibm-sterling-cve20204655-sql-injection (186091)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186091",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Sterling B2B Integrator",
               vendor: "IBM",
               versions: [
                  {
                     status: "affected",
                     version: "6.0.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.0.0",
                  },
                  {
                     status: "affected",
                     version: "5.2.6.5",
                  },
                  {
                     status: "affected",
                     version: "6.0.3.2",
                  },
               ],
            },
         ],
         datePublic: "2020-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 186091.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitCodeMaturity: "UNPROVEN",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/UI:N/AC:L/S:U/I:L/A:L/PR:L/C:L/RC:C/RL:O/E:U",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Data Manipulation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-16T16:40:34",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.ibm.com/support/pages/node/6367995",
            },
            {
               name: "ibm-sterling-cve20204655-sql-injection (186091)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186091",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               DATE_PUBLIC: "2020-11-13T00:00:00",
               ID: "CVE-2020-4655",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Sterling B2B Integrator",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.0.0.0",
                                       },
                                       {
                                          version_value: "5.2.0.0",
                                       },
                                       {
                                          version_value: "5.2.6.5",
                                       },
                                       {
                                          version_value: "6.0.3.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "IBM",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 186091.",
                  },
               ],
            },
            impact: {
               cvssv3: {
                  BM: {
                     A: "L",
                     AC: "L",
                     AV: "N",
                     C: "L",
                     I: "L",
                     PR: "L",
                     S: "U",
                     UI: "N",
                  },
                  TM: {
                     E: "U",
                     RC: "C",
                     RL: "O",
                  },
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Data Manipulation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.ibm.com/support/pages/node/6367995",
                     refsource: "CONFIRM",
                     title: "IBM Security Bulletin 6367995 (Sterling B2B Integrator)",
                     url: "https://www.ibm.com/support/pages/node/6367995",
                  },
                  {
                     name: "ibm-sterling-cve20204655-sql-injection (186091)",
                     refsource: "XF",
                     title: "X-Force Vulnerability Report",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/186091",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2020-4655",
      datePublished: "2020-11-16T16:40:34.940087Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T20:02:31.368Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}